Our pass rate is high to 98.9% and the similarity percentage between our 400 101 ccie study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco cisco 400 101 exam in just one try? I am currently studying for the Cisco passleader 400 101 exam. Latest Cisco passleader 400 101 Test exam practice questions and answers, Try Cisco 400 101 pdf Brain Dumps First.


2026 New 400-101 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/400-101/

Q1. The session status for an IPsec tunnel with IPv6-in-IPv4 is down with the error message IKE message from 10.10.1.1 failed its sanity check or is malformed. 

Which statement describes a possible cause of this error? 

A. There is a verification failure on the IPsec packet. 

B. The SA has expired or has been cleared. 

C. The pre-shared keys on the peers are mismatched. 

D. There is a failure due to a transform set mismatch. 

E. An incorrect packet was sent by an IPsec peer. 

Answer:

Explanation: 

IKE Message from X.X.X.X Failed its Sanity Check or is Malformed This debug error appears if the pre-shared keys on the peers do not match. In order to fix this issue, check the pre-shared keys on both sides. 1d00H:%CRPTO-4-IKMP_BAD_MESSAGE. IKE message from 150.150.150.1 failed its sanity check or is malformed. 

Reference: http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html#ike 

Q2. Which two solutions can reduce UDP latency? (Choose two.) 

A. fast retransmission 

B. fast recovery 

C. fast start 

D. low-latency queuing 

E. IP service level agreements 

F. congestion-avoidance algorithm 

Answer: D,E 

Explanation: 

IP SLA uses active traffic monitoring, which generates traffic in a continuous, reliable, and predictable manner to measure network performance. IP SLA sends data across the network to measure performance between multiple network locations or across multiple network paths. It simulates network data and IP services, and collects network performance information in real time. This information is collected: 

Response times 

One-way latency, jitter (interpacket delay variance) 

Packet loss 

Network resource availability 

LLQ uses the priority command. The priority command allows you to set up classes based on a variety of criteria (not just User Datagram Ports (UDP) ports) and assign priority to them, and is available for use on serial interfaces and ATM permanent virtual circuits (PVCs). A similar command, the ip rtp priority command, allows you to stipulate priority flows based only on UDP port numbers. Note: All the other answer choices can be used to improve TCP performance, but not UDP. 

References: http://www.cisco.com/c/en/us/td/docs/routers/xr12000/software/xr12k_r4-2/system_monitoring/configuration/guide/b_sysmon_cg42xr12k/b_sysmon_cg42xr12k_chapter_011.html http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsllq26.html 

Q3. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group? 

A. ROUTER_ID 

B. CLUSTER_ID 

C. ORIGINATOR_ID 

D. PEER_GROUP 

Answer:

Explanation: 

Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables. 

Reference: http://ieoc.com/forums/t/5326.aspx 

Q4. Which two options are BGP attributes that are updated when router sends an update to its eBGP peer? (Choose two.) 

A. weight 

B. local preference 

C. AS_path 

D. next-hop 

Answer: C,D 

Explanation: 

AS_Path describes the inter-AS path taken to reach a destination. It gives a list of AS Numbers traversed when reaching to a destination. Every BGP speaker when advertising a route to a peer will include its own AS number in the NLRI. The subsequent BGP speakers who advertise this route will add their own AS number to the AS_Path, the subsequent AS numbers get prepended to the list. The end result is the AS_Path attribute is able to describe all the autonomous systems it has traversed, beginning with the most recent AS and ending with the originating AS. 

NEXT_HOP Attribute specifies the next hop IP address to reach the destination advertised in the NLRI. NEXT_HOP is a well-known mandatory attribute that is included in every eBGP update. 

Reference: http://netcerts.net/bgp-path-attributes-and-the-decision-process/ 

Q5. Which two statements about IS-IS wide metrics are true? (Choose two.) 

A. The wide metric is a 24-bit field. 

B. The maximum link metric is 16777215. 

C. R3 and R4 periodically advertise PNSP messages to synchronize the IS-IS database. 

D. IS-IS devices that are enabled with wide metrics can become neighbors with a device that uses standard metrics. 

E. The maximum link metric is 4261412864. 

F. The maximum path metric is 16777215. 

Answer: A,B 

Q6. DRAG DROP 

Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right. 

Answer:  

Q7. Which option is a core event publisher for EEM? 

A. Timer 

B. Policy Director 

C. Applet 

D. Script 

Answer:

Explanation: 

EEM is a flexible, policy-driven framework that supports in-box monitoring of different components of the system with the help of software agents known as event detectors. The figure below shows the relationship between the EEM server, core event publishers (event detectors), and the event subscribers (policies). Basically, event publishers screen events and publish them when there is a match on an event specification that is provided by the event subscriber. Event detectors notify the EEM server when an event of interest occurs. The EEM policies that are configured using the Cisco command-line interface (CLI) then implement recovery on the basis of the current state of the system and the actions specified in the policy for the given event. EEM offers the ability to monitor events and take informational or corrective action when the monitored events occur or when a threshold is reached. An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. A script is a form of policy that is written in Tool Command Language (Tcl). 

Figure 1. Embedded Event Manager Core Event Detectors 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/15-mt/eem-15-mt-book/eem-overview.html 

Q8. Refer to the exhibit. 

How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15? 

A. No action is required, since Gig0/0 is not listed with a nondefault hello and hold time. 

B. Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface Gig0/0. 

C. Add the commands hello-interval 5 and hold-time 15 under "af-interface Gig0/0" under the address family. 

D. Add the commands default hello-interval and default hold-time under the af-interface Gig0/0 statement under the address family. 

Answer:

Explanation: 

To configure the hello interval for an interface, use the hello-interval command in interface configuration mode To configure the hold time for an interface, use the hold-time command in interface configuration mode. 

Reference: http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/routing/command/reference/b_routing_cr41crs/b_routing_cr41crs_chapter_010.html#wp2 323069468 

Q9. Which three options are characteristics of a Type 10 LSA? (Choose three.) 

A. It is an area-local, opaque LSA. 

B. Data is flooded to all routers in the LSA scope. 

C. It is used for traffic-engineering extensions to OSPF. 

D. It is a link-local, opaque LSA. 

E. Data is flooded only to the routers in the LSA scope that understand the data. 

F. It is used for traffic-engineering extensions to LDP. 

Answer: A,B,C 

Q10. Refer to the exhibit. 

Which three statements about this configuration are true? (Choose three.) 

A. The default route appears in the global routing table. 

B. The static route appears in the VRF red routing table. 

C. The subnet 192.168.1.0 is unique to the VRF red routing table. 

D. The static route is added to the global routing table and leaked from the VRF red. 

E. The subnet 192.168.1.0 is unique to the global routing table. 

F. 192.168.1.1 is reachable using any of the addresses on the router where the static route is configured. 

Answer: A,B,E 

Explanation: 

This is an example of the route leaking feature. Here, this static route is created for the red VRF so it will be installed into the red VRF routing table, but the use of the global keyword will cause this default route to appear in the global routing table.