400-101 CCIE Routing and Switching Written Practice Exam Set 12

Which of the following queuing methods is the most appropriate for handling voice, video, mission-critical, and lower-priority traffic? (Select the best answer.)


Options are :

  • .LLQ
  • WFQ
  • FIFO
  • CBWFQ

Answer : .LLQ

400-101 CCIE Routing and Switching Written Practice Exam Set 2

You administer Cisco routers in a PIM-SSM environment. You issue the ip multicast multipath s-g-hash basic command on a router that has multiple equalcost paths to a multicast source. Which of the following will occur? (Select the best answer.)


Options are :

  • The router will loadsplit based on the source address only.
  • The router will loadsplit based on the source and group addresses.
  • The router will loadsplit based on the source, group, and nexthop addresses.
  • The router will send traffic to the PIM neighbor with the highest IP address.

Answer : The router will loadsplit based on the source and group addresses.

Which of the following is not a feature of VTP version 3? (Select the best answer.)


Options are :

  • VLANs must be in the range from 1 through 1,000.
  • It can use encrypted passwords for authentication.
  • .It uses primary servers.
  • It can send PVLAN information in addition to normal VLANs.

Answer : VLANs must be in the range from 1 through 1,000.

Which of the following first-hop routing protocols can have up to four primary AVFs provide load balancing across multiple WAN links? (Select the best answer.)


Options are :

  • GLBP and HSRP
  • VRRP
  • GLBP
  • HSRP

Answer : GLBP

400-101 CCIE Routing and Switching Written Practice Exam Set 6

You have enabled CEF and have issued the ip verify unicast source reachable via rx command to enable uRPF in strict mode on a router. A TCP packet with a source address of 10.11.12.1 arrives on the router's FastEthernet0/1 interface. A route to 10.11.12.1 exists in the FIB, but the path through the FastEthernet0/1 interface is not the best path to the source. Which of the following will occur? (Select the best answer.)


Options are :

  • The packet will be forwarded through the best path.
  • The packet will be forwarded through a valid path.
  • The packet will be logged as suspicious.
  • The packet will be dropped.

Answer : The packet will be dropped.

You use PPP on your Cisco router to allow users to access the network remotely. Which of the following protocols can you use for authentication? (Select 2 choices.)


Options are :

  • .CHAP
  • PPP
  • .SLIP
  • PAP

Answer : .CHAP PAP

Which of the following LSA types contains subnet and router information for all the routers on a segment? (Select the best answer.)


Options are :

  • Type 1
  • Type 5
  • Type 2
  • Type 3

Answer : Type 2

400-101 CCIE Routing and Switching Written Practice Exam Set 8

You have issued the ip multicastrouting command and the ip pim ssm command from global configuration mode. Which of the following commands can you issue on each multicast interface to complete the SSM configuration? (Select 3 choices.)


Options are :

  • ip pim passive
  • ip pim sparsedensemode
  • ip pim sparsemode
  • .ip pim densemode
  • ip igmp version 2
  • ip igmp version 3

Answer : ip pim sparsedensemode ip pim sparsemode ip igmp version 3

mands should you issue to ensure that the enable password will be used if a RADIUS server is unavailable? (Select the best answer.)


Options are :

  • aaa accounting connection default start-stop group radius
  • .aaa authentication enable default group radius enable
  • aaa accounting exec enable start-stop group radius
  • aaa authorization exec default group radius if-authenticated
  • aaa authorization exec default group radius local

Answer : .aaa authentication enable default group radius enable

Which of the following Cisco Performance Monitor commands is not issued from global configuration mode? (Select the best answer.)


Options are :

  • .policy-map type performance-monitor
  • service-policy type performance-monitor
  • class-map
  • .flow record type performance-monitor
  • flow monitor type performance-monitor

Answer : service-policy type performance-monitor

400-101 CCIE Routing and Switching Written Practice Exam Set 6

How often is an IP SLA operation repeated if a frequency is not configured? (Select the best answer.)


Options are :

  • every 300 seconds
  • .IP SLA operations are not repeated if a frequency is not configured.
  • every 60 seconds
  • every five seconds

Answer : every 60 seconds

Which of the following values is the default TCP MSS setting for a Cisco router that is originating data destined for a remote IP network? (Select the best answer.)


Options are :

  • 10000 bytes
  • 1460 bytes
  • 536 bytes
  • 68 bytes

Answer : 536 bytes

Which of the following scenarios could cause the error message %STP-2- DISPUTE_DETECTED to appear? (Select the best answer.)


Options are :

  • A unidirectional link failure exists between two switches.
  • A BPDU has not been received on an interface with Bridge Assurance enabled.
  • A BPDU has been received on an interface with BPDU guard enabled.
  • An interface has been administratively shut down.

Answer : A unidirectional link failure exists between two switches.

400-101 CCIE Routing and Switching Written Practice Exam Set 6

Which of the following are Eline services? (Select 2 choices.)


Options are :

  • E-Tree
  • E-LAN
  • .EVPL
  • .EPL

Answer : .EVPL .EPL

400-101 CCIE Routing and Switching Written Practice Exam Set 7

IS-IS encapsulates its data at which layer of the OSI model? (Select the best answer.)


Options are :

  • .the Transport layer
  • the Network layer
  • the Data Link layer
  • the Application layer

Answer : the Data Link layer

Which of the following routing protocols can be used for routing on IoT networks? (Select the best answer.)


Options are :

  • OSPF
  • .IS-IS
  • RPL
  • EIGRP

Answer : RPL

Which of the following entries in the output of the show ip eigrp topology command indicates that a route is undergoing recomputation? (Select the best answer.)


Options are :

  • R 192.168.13.0/24, 1 successor, FD is Inaccessible, Q
  • A 192.168.13.0/24, 1 successor, FD is Inaccessible, Q
  • .r 192.168.13.0/24, 1 successor, FD is Inaccessible, Q
  • .P 192.168.13.0/24, 1 successor, FD is Inaccessible, Q

Answer : A 192.168.13.0/24, 1 successor, FD is Inaccessible, Q

400-101 CCIE Routing and Switching Written Practice Exam Set 3

Which of the following statements is true regarding hypervisors? (Select the best answer.)


Options are :

  • Both KVM and Xen are Type1 hypervisors.
  • Type2 hypervisors are also called native hypervisors.
  • .Both KVM and Xen are Type2 hypervisors.
  • Type1 hypervisors are generally slower than Type2 hypervisors.

Answer : Both KVM and Xen are Type1 hypervisors.

Which of the following commands could you issue to configure a router interface to use unicast packets to establish OSPF neighbor relationships? (Select 2 choices.)


Options are :

  • .ip ospf network point-to-point
  • ip ospf network non-broadcast
  • ip ospf network point-to-multipoint non-broadcast
  • .ip ospf network point-to-multipoint
  • .ip ospf network broadcast

Answer : ip ospf network non-broadcast ip ospf network point-to-multipoint non-broadcast

Which of the following statements are true regarding the IGMPv3 source filtering feature? (Select 2 choices.)


Options are :

  • It enables hosts to specify the systems from which they want to receive multicast traffic.
  • It enables hosts to specify the systems to which they will send multicast traffic.
  • It enables hosts to specify the systems to which they do not want to send multicast traffic.
  • It enables hosts to specify the systems from which they do not want to receive multicast traffic.

Answer : It enables hosts to specify the systems from which they want to receive multicast traffic. It enables hosts to specify the systems from which they do not want to receive multicast traffic.

400-101 CCIE Routing and Switching Written Practice Exam Set 2

The MPLS TTL field of a packet is set to 0. Which of the following statements is accurate? (Select the best answer.)


Options are :

  • .The packet is discarded.
  • The MPLS label is the last label in the stack.
  • The packet has a low priority.
  • .MPLS TTL propagation is disabled.

Answer : .The packet is discarded.

Which of the following best describes a feasible successor? (Select the best answer.)


Options are :

  • .the best metric along a path to a destination
  • a reported distance lower than the feasible distance of the current best path
  • the highest metric along a path to a destination
  • the total metric along a path to a destination

Answer : a reported distance lower than the feasible distance of the current best path

The OSPF process on RouterA, which is not a PE router, is associated with a VRF instance. Which of the following commands will disable PEspecific checks? (Select the best answer.)


Options are :

  • address-family ipv4 vrf
  • .ip vrf
  • capability vrf-lite
  • .ip vrf forwarding

Answer : capability vrf-lite

400-101 CCIE Routing and Switching Written Practice Exam Set 2

Which of the following is best suited for many-to-many applications? (Select the best answer.)


Options are :

  • SSM
  • PIM-DM
  • PIM-SM
  • Bidirectional PIM

Answer : Bidirectional PIM

You issue the following commands on the FastEthernet 0/1 interface of SwitchA: SwitchA(configif)#switchport portsecurity SwitchA(configif)#switchport portsecurity maximum 3 SwitchA(configif)#switchport portsecurity macaddress sticky SwitchA(configif)#switchport portsecurity violation restrict Which of the following are true? (Select 2 choices.)


Options are :

  • Up to three MAC addresses will be stored in the address table but not in the running configuration.
  • The switch will silently discard the traffic when a security violation occurs
  • The switch will discard the traffic, log the unauthorized entry attempt, increment the SecurityViolationcounter, and send an SNMP trap message when a security violation occurs.
  • Up to three MAC addresses will be stored in the running configuration.

Answer : The switch will discard the traffic, log the unauthorized entry attempt, increment the SecurityViolationcounter, and send an SNMP trap message when a security violation occurs. Up to three MAC addresses will be stored in the running configuration.

In a three-node OpenStack architecture, the network node consists of services from which of the following OpenStack components? (Select the best answer.)


Options are :

  • Glance
  • Neutron
  • Keystone
  • Horizon

Answer : Neutron

400-101 CCIE Routing and Switching Written Practice Exam Set 6

Which of the following is required by MPLS? (Select the best answer.)


Options are :

  • BGP
  • CEF
  • IS-IS
  • CDP

Answer : CEF

Which of the following commands configures primary and fallback link groups for Cisco PfR? (Select the best answer.)


Options are :

  • .border
  • pfr-map
  • set link-group
  • .link-group

Answer : set link-group

Which of the following TLVs are specific to LLDPMED? (Select 2 choices.)


Options are :

  • power management
  • management address
  • .port description
  • .location

Answer : power management .location

400-101 CCIE Routing and Switching Written Practice Exam Set 4

Which of the following commands creates a capture point named boson? (Select the best answer.)


Options are :

  • monitor capture point start boson
  • monitor capture point associate boson exsim
  • monitor capture point boson size 256 circular
  • monitor capture point ip cef boson fastethernet 0/1 both

Answer : monitor capture point ip cef boson fastethernet 0/1 both

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions