we provide Actual Cisco 400-201 real exam which are the best for clearing 400-201 test, and to get certified by Cisco CCIE SP Written v4.0. The 400-201 Questions & Answers covers all the knowledge points of the real 400-201 exam. Crack your Cisco 400-201 Exam with latest dumps, guaranteed!
2026 New 400-201 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/400-201/
Q1. Refer to the exhibit. R1 and R2 are multicast routers running PIM over Serial1/0. The PIM adjacency on R1 is not forming with the given configuration. What command can be entered on R1 to resolve the issue?
A. no access-list 100 deny 103 any any
B. no access-list 100 deny udp any anyeq 103
C. no access-list 100 deny ip any host 224.0.0.1
D. no access-list 100 deny ip any host 224.0.0.2
Answer: A
Explanation:
All PIM protocols share a common control message format. PIM control messages are sent as raw IP datagrams (protocol number 103), either multicast to the link-local ALL PIM
ROUTERS multicast group, or unicast to a specific destination.
Reference: http://www.metaswitch.com/resources/what-is-protocol-independent-multicast-pim
Q2. Refer to the exhibit.
It displays the Router_3 FIB information without any OSPF LSDB optimization. An engineer wants to optimize the OSPF LSDB in accordance with RFC 1587 Considering the following restraints:
.Router_3 maintains full connectivity
.Router_2 requires the least configuration
In order to achieve the OSPF LSDB optimization on Router_3. which Cisco IOS command should the engineer use on Router_2?
A. area 1 nssa default-information-originate
B. area n nssa no-summary
area 1 nssa no-redistribution
C. area 1 nssa no-redistribution
area 1 nssa default-information-originate
D. area 1 nssa no-summary
E. area 1 nssa no-redistribution
F. area 1 nssa no-summary
area 1 nssa default-information-originate
Answer: F
Q3. What are the four key design requirements for mobile IP backhaul? (Choose four.)
A. X2 interface turning point
B. bandwidth
C. Layer 2 Tunneling
D. native IPv6 support
E. DiffServQoS
F. MPLS-enabled interface
G. network timing distribution and recovery
H. mandatory Layer 3 access up to a cell site
Answer: C,D,G,H
Explanation: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_14-3/143_backhaul.html
Q4. Refer to the exhibit.
IS-IS configuration has been deployed using the default IS-IS metric value and default IS-IS metric-style. The SP decides to implement MPLS TE in all routers, except R5. In order to maintain IS-IS adjacency between R3 and R5 without impacting reachability, which command should be configured on R3 router under the IS-IS process?
A. metric-style narrow
B. metric-style wide
C. metric-style narrow transition
D. metric-style transition
Answer: D
Q5. A telecom company offers ISPs the ability to resell dynamic IP broadband services over its local loops, but it does not allow the resellers to install broadband network gateways. If an ISP wants to become a reseller but is unable to use NHRP, which tunneling protocol should be implemented?
A. IP in IP
B. IPsec
C. L2TP
D. GRE
Answer: C
Explanation:
However, while OpenVPN can not be used with VoIP, L2TP can be used for VoIP. Only use this if OpenVPN is not available and you are in need of very high security/encryption.
Q6. A service provider is designing control policies at the customer edge of the network, in order to prevent usage that exceeds the contracted terms A new client that is contracted for only 2 Gbps is connecting to the service provider edge with a 10 Gbps interface. Which two OoS strategies meet the design goal? (Choose two.)
A. On the customer edge device, enable policing on the interface that is connected to the service provider.
B. On the service provider edge, enable WRED on the customer port.
C. On the customer edge, enable WRED on the interface that is connected to the service provider
D. I On the service provider edge, enable policing on the customer port
E. the customer edge device, enable traffic shaping on the interface that is connected to the service provider.
F. C On the service provider edge, enable traffic shaping on the customer port
Answer: D,E
Q7. DRAG DROP
Refer to the exhibit.
PE1 and PE2 has a Layer 2 VPN over a GRE tunnel. This GRE tunnel built between P1 and P2 has LDP enabled. Consider a packet capture of the packets from CE1 and CE2 at P1 and R1 link. Drag the headers on the left and drop them on the right in the order of the encapsulation, starting from the inner header (at the top) to the outer header (at the bottom).
Answer:
Q8. Refer to the exhibit.
In the topology, networks in VRF A use the service provider network for transport. PE1 and PE2 run MP-BGP VPNv4 peering. Links between PE and P routers have MPLS enabled. Links between R1 and P routers do not support MPLS.
Which technology can be implemented to build MPLS services between P1 and P2?
A. Layer 3 VPN over GRE Tunnels
B. L2TPv3
C. RSVP Signaled Tunneling
D. MPLS LDP Tunnels
E. MPLS TE
Answer: B
Q9. A company is deciding between an HVR and SVR solution in order to finalize a virtualization project proposal. Which is an advantage of a HVR solution versus a SVR solution?
A. A HVR solution implements dedicated data plane resources.
B. A HVR solution implements shared control plane resources.
C. A HVR solution introduces significant contention of resources.
D. A HVR solution implements dedicated chassis resources.
Answer: A
Explanation:
Comparison of Virtualized Routing Architectures
Category Hardware-Isolated Virtual Router Software-Isolated Virtual Router
Control plane resources (CPU, memory)
Dedicated
Shared
Data plane resources (forwarding engine, queues)
Dedicated
Shared
Chassis resources (power supplies, blowers, fabric)
Shared
Shared
Management, configuration
Dedicated
Typically shared, but varies depending on degree of virtualization
Connections between virtualized routing entities
Typically external
Typically internal, but possibly external
Per-chassis scalability (routing adjacencies, prefixes)
Increased with additional logical routers
Unaffected by additional virtual routers
Reference: http://www.cisco.com/en/US/solutions/collateral/ns341/ns524/ns562/ns573/white_paper_c1 1-512753_ns573_Networking_Solutions_White_Paper.html
Q10. How many bits are expressed by";:" in the address 2D01:DB::C:B7BA:130B?
A. 16 bits
B. 32 bits
C. 40 bits
D. 44 bits
E. 48 bits
F. 52 bits
G. 56 bits
H. 64 bits
Answer: E