It is more faster and easier to pass the Cisco 400 101 dumps exam by using High quality Cisco CCIE Routing and Switching (v5.0) questuins and answers. Immediate access to the Renew 400 101 dumps Exam and find the same core area ccie 400 101 questions with professionally verified answers, then PASS your exam with a high score now.


2026 New 400-101 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/400-101/

Q1. Refer to the exhibit. 

R3 is failing to join the multicast group 224.1.1.1 that is sourcing from R1. Which two actions can you take to allow multicast traffic to flow correctly? (Choose two.) 

A. Remove the static multicast route on R1. 

B. Configure OSPF on R1 and R3 to include the tunnel interfaces. 

C. Add an additional static multicast route on R2 for multicast group 224.1.1.1 toward R3. 

D. Replace the static multicast route on R1 to send traffic toward R2. 

E. Remove the static unicast route on R1. 

F. Add an additional static unicast route on R2 toward the loopback interface of R3. 

Answer: A,B 

Explanation: 

Since the tunnel interfaces are not part of OSPF, the best path to the multicast source of R1 from R3 would be over the Gi0/0 path via OSPF. However, the static mroute is configured to use the tunnel, so this causes an RPF failure used in Sparse Mode. Best fix is to add the tunnel interfaces into OSPF and remove the static mroute so that that the RPF check no longer fails. 

Q2. Refer to the exhibit. 

Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable? 

A. object tracking 

B. HSRP 

C. GLBP 

D. LACP 

Answer:

Explanation: 

The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes. 

Clients include the following features: 

. Embedded Event Manager (EEM) 

. Gateway Load Balancing Protocol (GLBP) 

. Hot Standby Redundancy Protocol (HSRP) 

. Virtual port channel (vPC) 

. Virtual Router Redundancy Protocol (VRRP) 

The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_object.html 

Q3. Which two hashing algorithms can be used when configuring SNMPv3? (Choose two.) 

A. MD5 

B. SHA-1 

C. Blowfish 

D. DES 

E. AES 

F. SSL 

Answer: A,B 

Explanation: 

Note that SNMPv3 does not send passwords in clear-text and uses hash-based authentication with either MD5 or SHA1 functions (HMAC authentication – the packet conted is hashed along with authentication key to produce the authentication string). 

Reference: http://blog.ine.com/2008/07/19/snmpv3-tutorial/ 

Q4. DRAG DROP 

Drag and drop the argument of the mpls ip cef load-sharing command on the left to the function it performs on the right. 

Answer:  

Q5. What is the ip dhcp snooping information option command used for? 

A. It displays information about the DHCP snooping table. 

B. It sends a syslog and an SNMP trap for a DHCP snooping violation. 

C. It enables the DHCP snooping host tracking feature. 

D. It enables DHCP option 82 data insertion. 

Answer:

Explanation: 

To enable DHCP option-82 data insertion, perform this task: 

Command 

Purpose 

Step 1 

Router(config)# ip dhcp snooping information option 

Enables DHCP option-82 data insertion. 

Step 2 

Router(config)# ip dhcp snooping information option replace 

Or: 

Router(config-if)# ip dhcp snooping information option replace 

(Optional) Replaces the DHCP relay information option received in snooped packets with the switch's option-82 data. 

Step 3 

Router(config)# do show ip dhcp snooping | include 82 

Verifies 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html 

Q6. Which three components comprise the structure of a pseudowire FEC element? (Choose three.) 

A. pseudowire ID 

B. pseudowire type 

C. control word 

D. Layer 3 PDU 

E. header checksum 

F. type of service 

Answer: A,B,C 

Explanation: 

The Pseudowire ID FEC element has the following components: 

. Pseudowire ID FEC — The first octet has a value of 128 that identifies it as a Pseudowire ID FEC element. 

. Control Word Bit (C-Bit) — The C-bit indicates whether the advertising PE expects the control word to be present for pseudowire packets. A control word is an optional 4-byte field located between the MPLS label stack and the Layer 2 payload in the pseudowire packet. The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. 

. Pseudowire Type — PW Type is a 15-bit field that represents the type of pseudowire. Examples of pseudowire types are shown in Table 6-1. 

. Pseudowire Information Length — Pseudowire Information Length is the length of the Pseudowire ID field and the interface parameters in octets. When the length is set to 0, this FEC element stands for all pseudowires using the specified Group ID. The Pseudowire ID and Interface Parameters fields are not present. 

. Group ID — The Group ID field is a 32-bit arbitrary value that is assigned to a group of pseudowires. 

. Pseudowire ID — The Pseudowire ID, also known as VC ID, is a non-zero, 32-bit identifier that distinguishes one pseudowire from another. To connect two attachment circuits through a pseudowire, you need to associate each one with the same Pseudowire ID. 

. Interface Parameters — The variable-length Interface Parameters field provides attachment circuit-specific information, such as interface MTU, maximum number of concatenated ATM cells, interface description, and so on. 

Reference: http://www.ciscopress.com/articles/article.asp?p=386788&seqNum=2 

Q7. Which two statements about BGP loop prevention are true? (Choose two.) 

A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering. 

B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary. 

D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering. 

E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop. 

F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted. 

Answer: A,B 

Q8. Which statement about BGP and diverse path advertisement is true? 

A. The BGP best-path selection must be disabled. 

B. The BGP best-path selection algorithm has been changed to always ignore the IGP metric. 

C. The BGP best-path selection algorithm has been changed so that two BGP paths can be flagged as best in the BGP table. 

D. The BGP best-path selection algorithm has not been changed. 

E. The BGP best-path selection is disabled for BGP routes for which the feature is enabled. 

Answer:

Explanation: 

The BGP Diverse Path Using a Diverse-Path Route Reflector feature allows BGP to distribute an alternative path other than the best path between BGP speakers when route reflectors are deployed. This additional path is added to the best-path, and the best path algorithm still remains unchanged. 

Q9. Which two statements about TCP are true? (Choose two.) 

A. TCP option must be divisible by 32. 

B. It has a 16-bit window size. 

C. Its maximum data offset is fifteen 32-bit words. 

D. It has a 32-bit window size. 

E. Its maximum data offset is ten 32-bit words. 

F. It has a 32-bit checksum field. 

Answer: B,C 

Q10. Refer to exhibit. 

The router is unreachable using telnet. Which option is solution? 

A. Use an extended access list instead of standard access list. 

B. The transport output telnet command must be added. 

C. The VRF configuration must be completed. 

D. The “vrf-also” keyword must be added to the access-class configuration. 

Answer: