Updating Braindump2go Exam Dumps
Hi, this is the official Braindump2go Blog! We Share the Latest Certification News Here, such as Microsoft, Cisco, CompTIA, Amazon, Juniper, VMware, etc.

[2017-New-Version]400-201 Exam PDF and VCE Dumps Free Download in Braindump2go[101-110]

Home  /   [2017-New-Version]400-201 Exam PDF and VCE Dumps Free Download in Braindump2go[101-110]

2017 May New: Cisco 400-201 Exam Dumps with VCE and PDF Free Updated in www.Braindump2go.com  Today!
100% Real Exam Questions! 100% Exam Pass Guaranteed!

1.|2017 Version New 400-201 Exam Dumps (PDF & VCE) 627Q&As Download:

2.|2017 Version New 400-201 Exam Questions & Answers Download:


In a secure domain router scenario, which two functions are shared amongst all SDR in the system? (Choose two.)

A.    configuration
B.    protocols
C.    routing tables
D.    chassis-control
E.    switch-fabric

Answer: DE
Secure domain routers (SDRs) provide a means of partitioning a router into multiple, independent routers. SDRs perform routing functions in the same manner as a physical router but share resources with the rest of the system. For example, the applications, configurations, protocols, and routing tables assigned to an SDR belong to that SDR only, but other functions such as chassis control, switch fabric, and partitioning are shared with the rest of the system.
http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-3/system_management/command/reference/b_sysman_cr43crs/b_sysman_cr43crs_chapt er_01110.html

Refer to the exhibit. R3 cannot install a route to R1-R2 subnet 2001:1:155:12::/64. Which action resolves this issue?

A.    Add the redistribute ospf 1 include-connected command under the ipv6 router eigrp 10 process.
B.    For the OSPF process, add the no shutdown command.
C.    For prefix-list OSPF_INTO_EIGRP seq 20, replace the prefix with 2001:155:1:12::/64.
D.    For route-map OSPF_INTO_EIGRP, add the set metric 1000 1 255 1 1500 command.

Answer: A

In a routing virtualization concept, which are the two main techniques for creating virtualized router entities as defined by their physical and operational characteristics? (Choose two.)

A.    VDC
B.    SVR
C.    DRP
D.    HVR
E.    SDR

Answer: BD

Which OSPF LSA is used to support MPLS Traffic-Engineering?

A.    NSSA LSA (Type 7)
B.    Opaque LSA (Type 11)
C.    Opaque LSA (Type 9)
D.    Opaque LSA (Type 10)
E.    External LSA (Type 5)

Answer: D
Type 10 – an area-local “opaque” LSA as defined by RFC2370. Opaque LSAs contain information which should be flooded by other routers even if the router is not able to understand the extended information itself.
Typically type 10 LSAs are used for traffic engineering extensions to OSPF, flooding extra information about links beyond just their metric, such as link bandwidth and color.

Which of the following processes in IOS XR run exclusively on the Route Processor? (Choose two.)

A.    wdsysmon
B.    mpls_idp
C.    sysmgr
D.    gsp
E.    bgp

Answer: BE

Which BGP feature improves the convergence and response time to adjacency changes with BGP neighbors?

A.    reducing BGP scanner timing to the minimum that is supported
B.    BGP Multihop
C.    Next-Hop Address Tracking
D.    Fast Peering Session Deactivation
E.    TTL Security Check

Answer: D
BGP fast peering session deactivation improves BGP convergence and response time to adjacency changes with BGP neighbors. This feature is event driven and configured on a per-neighbor basis. When this feature is enabled, BGP will monitor the peering session with the specified neighbor. Adjacency changes are detected and terminated peering sessions are deactivated in between the default or configured BGP scanning interval.

Which statement about OSPF authentication is true?

A.    To enable OSPF authentication in a network, OSPF area 0 authentication must be enabled first.
B.    The payload of OSPFv3 packets contains no authentication information.
C.    OSPFv3 supports Advanced Encryption Standard
D.    OSPFv3 uses router ID as a key to encrypt OSPF hello packets.
E.    OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP.

Answer: B

What is the order of preference for these commands when all of them are applied to one neighbor in the BGP inbound filter direction?

A.    prefix-list/distribute-list, filter-list, route-map
B.    route-map, filter-list, prefix-list/distribute-list
C.    route-map, prefix-list/distribute-list, filter-list
D.    filter-list, prefix-list/distribute-list, route-map
E.    prefix-list/distribute-list, route-map, filter-list

Answer: B

Which two statements about EIGRP are true? (Choose two)

A.    EIGRP supports VLSM, route summarization, and routing update authentication.
B.    If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.    Passive routes are in the process of being calculated by DUAL.
D.    EIGRP exchanges full routing table information with neighboring routers with every update.
E.    A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

Answer: AE

Which statement about Remotely Triggered Black Hole (RTBH) is true?

A.    Route tagging is one of the techniques used by RTBH
B.    It is used for BGP authentication
C.    It cannot work with static routes
D.    It uses extended ACLs for blocking attacks by creating a black hole
E.    Before configuring RTBH. LDP must be enabled on the interface

Answer: A


1.|2017 Version New 400-201 Exam Dumps (PDF & VCE) 627Q&As Download:

2.|2017 Version New 400-201 Study Guide Video: