[Free] February 2017(Feb) Ensurepass Examcollection Cisco 400-101 Practice Test 321-330

Ensurepass

CCIE Routing and Switching Written Exam v5.1

 

QUESTION 321

Refer to the exhibit. If the network switch is configured as shown, which two statements about network traffic are true? (Choose two.)

 

clip_image002

 

A.

Traffic enters the shaper on a FIFO basis.

B.

Traffic enters the shaper on a weighted fair queueing basis.

C.

Drop behavior is random for traffic in excess of 6 Mbps.

D.

Voice traffic is given priority until it reaches 1.5 Mbps.

E.

Voice traffic is given priority until it reaches 6 Mbps.

 

Correct Answer: AD

Explanation:

A. Serial interfaces at E1 (2.048 Mbps) and below use weighted fair queueing (WFQ) by default. Other interfaces use first-in first-out (FIFO) by default.

D. Voice traffic is given priority up to 25% of the shape average value, which is 6000000, so 25% of 6 Mbps is 1.5 Mbps.

 

 

QUESTION 322

Which two options describe two functions of a neighbor solicitation message? (Choose two.)

 

A.

It requests the link-layer address of the target.

B.

It provides its own link-layer address to the target.

C.

It requests the site-local address of the target.

D.

It provides its own site-local address to the target.

E.

It requests the admin-local address of the target.

F.

It provides its own admin-local address to the target.

 

Correct Answer: AB

Explanation:

Neighbor solicitation messages are sent on the local link when a node wants to determine the link- layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.

 

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message

clip_image004

 

After receiving the neighbor solicitation message, the destination node replies by sending a neighbor advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the local link. The source address in the neighbor advertisement message is the IPv6 address of the node (more specifically, the IPv6 address of the node interface) sending the neighbor advertisement message. The destination address in the neighbor advertisement message is the IPv6 address of the node that sent the neighbor solicitation message. The data portion of the neighbor advertisement message includes the link-layer address of the node sending the neighbor advertisement message.

After the source node receives the neighbor advertisement, the source node and destination node can communicate.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html

 

 

QUESTION 323

Which statement about VRRP is true?

 

A.

It supports load balancing.

B.

It can be configured with HSRP on a switch or switch stack.

C.

It supports IPv4 and IPv6.

D.

It supports encrypted authentication.

 

Correct Answer: B

Explanation:

VRRP Limitations

You can configure both HSRP and VRRP on a switch or switch stack. However, you cannot add a switch model that supports only one protocol to a stack that is configured for both protocols.

The VRRP implementation on the switch does not support the MIB specified in RFC 2787.

The VRRP implementation on the switch supports only text -based authentication.

The switch supports VRRP only for IPv4.

 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_58_se/configuration/guide/3750xscg/swhsrp.html#pgfId-1107127

 

 

QUESTION 324

Which IPv6 prefix is used for 6to4 tunnel addresses?

 

A.

2001. . /23

B.

2002. . /16

C.

3ffe. . /16

D.

5f00. . /8

E.

2001. . /32

 

Correct Answer: B

Explanation:

6to4 works by taking advantage of a reserved IPv6 prefix, 2002::/16. A 6to4 tunnel interface automatically converts the 32 bits in its IPv6 address following this prefix to a global unicast IPv4 address for transport across an IPv4 network such as the public Internet.

Reference: http://packetlife.net/blog/2010/mar/15/6to4-ipv6-tunneling/

 

 

QUESTION 325

In a nonbackbone OSPF area, all traffic that is destined to the Internet is routed by using a default route that is originated by the ABR. Which change in the configuration of the OSPF area type causes traffic from that area that is destined to the Internet to be dropped?

 

A.

The OSPF area changes from NSSA to totally stubby area.

B.

The OSPF area changes from NSSA to regular area.

C.

The OSPF area changes from stub area to totally stubby area.

D.

The OSPF area changes from stub area to NSSA.

 

Correct Answer: D

Explanation:

The ABR for the NSSA generates the default route, but not by default. To force the ABR to generate the default route, use the area <area id> nssa default-information originate command. The ABR generates a Type 7 LSA with the link-state ID 0.0.0.0 and is advertised inside the NSSA. This default route will be propagated inside the NSSA as Type 7 LSA.

Reference: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13692-21.html#nssas

 

 

QUESTION 326

Which two options are two characteristics of the HSRPv6 protocol? (Choose two.)

 

A.

It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.0fff.

B.

It uses UDP port number 2029.

C.

It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.ffff.

D.

It uses UDP port number 2920.

E.

If a link local IPv6 address is used, it must have a prefix.

 

Correct Answer: AB

Explanation:

HSRP IPv6 Virtual MAC Address Range

HSRP IPv6 uses a different virtual MAC address block than does HSRP for IP:

0005.73A0.0000 through 0005.73A0.0FFF (4096 addresses)

HSRP IPv6 UDP Port Number

Port number 2029 has been assigned to HSRP IPv6.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-sy/fhp-15-sy-book/HSRP-for-IPv6.html

 

 

QUESTION 327

Refer to the exhibit. What is the polling frequency set by this configuration?

 

clip_image006

 

A.

60 seconds

B.

10 seconds

C.

360 seconds

D.

60 milliseconds< /span>

E.

10 milliseconds

 

Correct Answer: A

Explanation:

The frequency value lists the polling interval, in seconds.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_icmp_echo.html

 

 

QUESTION 328

Which two statements about the ipv6 ospf authentication command are true? (Choose two.)

 

A.

The command is required if you implement the IPsec AH header.

B.

The command configures an SPI.

C.

The command is required if you implement the IPsec TLV.

D.

The command can be used in conjunction with the SPI authentication algorithm.

E.

The command must be configured under the OSPFv3 process.

Correct Answer: AB

Explanation:

OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3. In OSPFv3, authentication fields have been removed from OSPFv3 packet headers. When OSPFv3 runs on IPv6, OSPFv3 requires the IPv6 authentication header (AH) or IPv6 ESP header to ensure integrity, authentication, and confidentiality of routing exchanges. IPv6 AH and ESP extension headers can be used to provide authentication and confidentiality to OSPFv3.

To use the IPsec AH, you must enable the ipv6 ospf authentication command. To use the IPsec ESP header, you must enable the ipv6 ospf encryption command. The ESP header may be applied alone or in combination with the AH, and when ESP is used, both encryption and authentication are provided. Security services can be provided between a pair of communicating hosts, between a pair of communicating security gateways, or between a security gateway and a host.

To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-route-ospfv3-auth-ipsec.html

 

 

QUESTION 329

Which measure does ISIS use to avoid sending traffic with a wrong MTU configuration?

 

A.

ISIS does not protect from MTU mismatch.

B.

MTU value is communicated in ISIS Sequence Number PDUs (SNP), and ISIS adjacency is not established if an MTU mismatch is detected.

C.

ISIS uses path MTU discovery as specified in RFC 1063.

D.

ISIS uses padding of hello packets to full MTU.

 

Correct Answer: D

Explanation:

Intermediate System-to-Intermediate System (IS-IS) hellos are padded to the full maximum transmission unit (MTU) size. The benefit of padding IS-IS Hellos (IIHs) to the full MTU is that it allows for early detection of errors due to transmission problems with large frames or due to mismatched MTUs on adjacent interfaces.

Reference: http://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to-intermediate-system-is-is/47201-isis-mtu.html

 

 

QUESTION 330

Which BGP feature allows BGP routing tables to be refreshed without impacting established BGP sessions?

 

A.

BGP synchronization

B.

soft reconfiguration

C.

confederations

D.

hard reset

 

Correct Answer: B

Explanation:

Clearing a BGP session using a hard reset invalidates the cache and results in a negative impact on the operation of networks as the information in the cache becomes unavailable. Soft reset is recommended because it allows routing tables to be reconfigured and activated without clearing the BGP session. Soft reset is done on a per-neighbor basis.

Reference: http://www.cisco.com/en/US/products/ps6599/products_data_sheet09186a0080087b3a.html

 

Free VCE & PDF File for Cisco 400-101 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …