We provide real 400 101 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 400 101 vce Exam quickly & easily. The ccie 400 101 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco ccie 400 101 dumps pdf and vce product and material, you can easily pass the cisco 400 101 exam.


2026 New 400-101 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/400-101/

Q1. Refer to the exhibit. 

Which option is the most likely explanation of the duplicate address message logged? 

A. HSRP misconfiguration 

B. a PC with IP of 10.10.1.1 

C. spanning-tree-loop 

D. a hardware problem 

Answer:

Q2. Refer to the exhibit. 

Which statement is true? 

A. There is an MPLS network that is running 6PE, and the ingress PE router has no mpls ip propagate-ttl. 

B. There is an MPLS network that is running 6VPE, and the ingress PE router has no mpls ip propagate-ttl. 

C. There is an MPLS network that is running 6PE or 6VPE, and the ingress PE router has mpls ip propagate-ttl. 

D. There is an MPLS network that is running 6PE, and the ingress PE router has mpls ip propagate-ttl. 

E. There is an MPLS network that is running 6VPE, and the ingress PE router has mpls ip propagate-ttl. 

Answer:

Explanation: 

The second hop shows and IPV6 address over MPLS, so we know that there is an MPLS network running 6PE or 6VPE. And because the second and third hops show up in the traceroute. Then TTL is being propagated because if the “no ip propagate-ttl” command was used these devices would be hidden in the traceroute. 

Q3. Which three improvements does Cisco IOS XE Software offer over traditional IOS Software? (Choose three.) 

A. It can run applications as separate processes on multicore CPUs. 

B. It supports drivers for data plane ASICs outside of the operating system. 

C. It allows platform-dependent code to be compiled into a single image. 

D. It supports multiple IOS instances simultaneously, sharing resources and internal infrastructure for scalability. 

E. It allows platform-independent code to be abstracted into a single microkernel for portability across platforms. 

F. It uses a QNX Neutrino-based environment underneath the IOS Software. 

Answer: A,B,C 

Q4. DRAG DROP 

Drag and drop the router preference on the left to the correct routing sequence (from most preferred to least preferred) on the right. 

Answer:  

Q5. Which two statements about reverse ARP are true? (Choose two.) 

A. Its servers require static mappings. 

B. It works with AutoInstall to configure new devices. 

C. It provides IP addresses for subnet masks. 

D. It provides IP addresses for default gateways. 

E. It requires less maintenance than DHCP. 

Answer: A,B 

Q6. On a broadcast interface, which two OSPF states support BFD sessions? (Choose two.) 

A. DR 

B. BDR 

C. DROTHER 

D. 2WAY 

E. FULL 

F. ACTIVE 

Answer: A,B 

Q7. Which variable in an EEM applet is set when you use the sync yes option? 

A. $_cli_result 

B. $_result 

C. $_string_result 

D. $_exit_status 

Answer:

Explanation: 

The CLI event detector screens CLI commands for a regular expression match. When a match is found, an event is published. The match logic is performed on the fully expanded CLI command after the command is successfully parsed and before it is executed. The CLI event detector supports three publish modes: 

. Synchronous publishing of CLI events--The CLI command is not executed until the EEM policy exits, and the EEM policy can control whether the command is executed. The read/write variable, _exit_status, allows you to set the exit status at policy exit for policies triggered from synchronous events. If _exit_status is 0, the command is skipped, if _exit_status is 1, the command is run. 

. Asynchronous publishing of CLI events--The CLI event is published, and then the CLI command is executed. 

. Asynchronous publishing of CLI events with command skipping--The CLI event is published, but the CLI command is not executed. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-

book/eem-cr-e1.html 

Q8. Which statement about the BGP originator ID is true? 

A. The route reflector always sets the originator ID to its own router ID. 

B. The route reflector sets the originator ID to the router ID of the route reflector client that injects the route into the AS. 

C. The route reflector client that injects the route into the AS sets the originator ID to its own router ID. 

D. The originator ID is set to match the cluster ID. 

Answer:

Explanation: 

An RR reflecting the route received from a RR-Client adds: 

. Originator ID- a 4-byte BGP attribute that is created by the RR. This attribute carries the Router ID of the originator of the route in the local AS. If the update comes back to the originator, it ignores the update. 

. Cluster List- A Cluster List is a list of Cluster IDs that an update has traversed. When a route reflector sends a route received from a client to a non-client, it appends the local Cluster ID. If a route reflector receives a route whose Cluster List contains the local Cluster ID, it ignores the update. 

Reference: https://sites.google.com/site/amitsciscozone/home/bgp/bgp-route-reflectors 

Q9. Which command drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value, and also causes the Security Violation counter to increment? 

A. switchport port-security violation protect 

B. switchport port-security violation drop 

C. switchport port-security violation shutdown 

D. switchport port-security violation restrict 

Answer:

Explanation: 

When configuring port security violation modes, note the following information: 

. protect—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value. 

. restrict—Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment. 

. shutdown—Puts the interface into the error-disabled state immediately and sends an SNMP trap notification. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.html 

Q10. Which Cisco IOS XE process administers routing and forwarding? 

A. Forwarding manager 

B. Interface manager 

C. Cisco IOS 

D. Host manager 

Answer:

Explanation: 

Some of the processes are listed in the table below: 

Process 

Purpose 

Affected FRUs 

SubPackage Mapping 

Host Manager 

Provides an interface between the IOS process and many of the information-gathering functions of the underlying platform kernel and operating system. 

RP (one instance per RP) 

SIP (one instance per SIP) 

ESP (one instance per ESP) 

RPControl 

SIPBase 

ESPBase 

Interface Manager 

Provides an interface between the IOS process and the per-SPA interface processes on the SIP. 

RP (one instance per RP) 

SIP (one instance per SIP) 

RPControl 

SIPBase 

IOS 

The IOS process implements all forwarding and routing features for the router. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 

RPIOS 

Forwarding Manager 

Manages the downloading of configuration to each of the ESPs and the communication of forwarding plane information, such as statistics, to the IOS process. 

RP (one per software redundancy instance per RP). Maximum of two instances per RP. 

ESP (one per ESP) 

RPControl 

ESPBase 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg /Software_Packaging_Architecture.html