400-101 CCIE Routing and Switching Written Practice Exam Set 1

In which of the following situations does a router use AD values to determine route selection? (Select the best answer.)


Options are :

  • when multiple routes to the same destination network are received, and all of these routes are received from the same routing protocol
  • when multiple routes to different destination networks are received, and all of these routes are received from the same routing protocol
  • when multiple routes to the same destination network are received, and each of these routes is received from a different routing protocol
  • when multiple routes to different destination networks are received, and each of these routes is received from a different routing protocol

Answer : when multiple routes to the same destination network are received, and each of these routes is received from a different routing protocol

Cisco CCNP Route 300-101 Practice Tests Set 4

Which of the following statements best describes the BGP split horizon rule? (Select the best answer.)


Options are :

  • Routes learned through eBGP are not advertised to iBGP peers.
  • Routes learned through iBGP are not advertised to eBGP peers.
  • Routes learned through eBGP are not advertised to eBGP peers.
  • Routes learned through iBGP are not advertised to iBGP peers.

Answer : Routes learned through iBGP are not advertised to iBGP peers.

What AD is assigned to external BGP routes by default? (Select the best answer.)


Options are :

  • 1
  • 170
  • 20
  • 90
  • 200
  • 5

Answer : 20

You issue the snmpserver host auth version 3 dot1x command on a Cisco switch. No previous SNMP commands have been issued on the switch. Which of the following statements are true? (Select 2 choices.)

A. Notifications are sent as informs.

B. Notifications are sent as traps.

C. Only 802.1X notifications are sent.

D. Only authentication notifications are sent.

E. The noAuthNoPriv security level is applied to the host.

F. The AuthNoPriv security level is applied to the host.


Options are :

  • F,B
  • C,A
  • E,A
  • B,C
  • D,C
  • B,E

Answer : B,E

Cisco CCNP Route 300-101 Practice Tests Set 2

A switch receives a BPDU with the TC bit set. By default, how long will it take for the switch to age out the MAC address table? (Selectthe best answer.)


Options are :

  • 20 seconds
  • two seconds
  • 300 seconds
  • 15 seconds
  • 35 seconds

Answer : 15 seconds

Which of the following provides antireplay protection for GET VPN group members? (Select the best answer.)


Options are :

  • TEK
  • KEK
  • TSK
  • SAR

Answer : SAR

On which interface type is turbo flooding not supported? (Select the best answer.)


Options are :

  • FDDI
  • Token Ring
  • HDLCencapsulated Serial
  • ARPAencapsulated Ethernet

Answer : Token Ring

400-101 CCIE Routing and Switching Written Practice Exam Set 7

Which of the following commands configures PIM-SM interfaces to use dense mode to flood Auto-RP traffic to 224.0.1.39 and 224.0.1.40? (Select the best answer.)


Options are :

  • ip pim send-rp-announce
  • ip pim send-rp-discovery
  • ip pim sparse-dense-mode
  • ip pim autorp listener

Answer : ip pim autorp listener

What is the default WTD maximum threshold for queue 1? (Select the best answer.)


Options are :

  • 50 percent
  • 200 percent
  • 400 percent
  • 100 percent

Answer : 400 percent

Which of the following packet types can be captured by EPC on egress? (Select the best answer.)


Options are :

  • only unicast packets
  • no packets
  • only unicast and broadcast packets
  • unicast, broadcast, and multicast packets
  • only unicast and multicast packets
  • only broadcast and multicast packets

Answer : only unicast and broadcast packets

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following statements is correct about external routes received by an NSSA? (Select the best answer.)


Options are :

  • External routes from an ASBR are converted to Type 7 LSAs and tunneled through the NSSA to theABR, where they are converted to Type 5 LSAs.
  • External routes from an ASBR are converted to Type 5 LSAs and tunneled through the NSSA to theABR, where they are converted to Type 7 LSAs.
  • External routes from an ASBR are converted to Type 3 LSAs and tunneled through the NSSA to theABR, where they are converted to Type 5 LSAs.
  • External routes from an ASBR are converted to Type 3 LSAs and tunneled through the NSSA to theABR, where they are converted to Type 7 LSAs.
  • External routes from an ASBR are converted to Type 5 LSAs and tunneled through the NSSA to theABR, where they are advertised as Type 5 LSAs.
  • External routes from an ASBR are converted to Type 7 LSAs and tunneled through the NSSA to theABR, where they are advertised as Type 7 LSAs.

Answer : External routes from an ASBR are converted to Type 7 LSAs and tunneled through the NSSA to theABR, where they are converted to Type 5 LSAs.

Which of the following statements best describes the purpose of holddown timers? (Select the best answer.)


Options are :

  • Holddown timers are used by RIP to specify the amount of time to suppress information regarding abetter path to a route.
  • Holddown timers are used by OSPF to specify the amount of time between sending hello packets.
  • Holddown timers are used by RIP to specify the amount of time to wait between broadcasting routing table updates.
  • Holddown timers are used by OSPF to specify the amount of time to wait before declaring a neighbor tobe down.
  • Holddown timers are used by RIP to specify the amount of time to wait before declaring a route to be unreachable.
  • Holddown timers are used by RIP to specify the amount of time to wait before deleting a route from therouting table.

Answer : Holddown timers are used by RIP to specify the amount of time to suppress information regarding abetter path to a route.

Which of the following planes is responsible for exchanging routing and label information? (Select the best answer.)


Options are :

  • the management plane
  • the routing plane
  • the forwarding plane
  • the control plane
  • the data plane

Answer : the control plane

Cisco CCNP Route 300-101 Practice Tests Set 1

Which of the following requires a physical RP? (Select the best answer.)


Options are :

  • PIM-DM
  • Bidirectional PIM
  • PIM-SM
  • PIM-SSM
  • PIM-SDM

Answer : PIM-SM

What restrictions apply to OSPF virtual link creation? (Select 3 choices.)

A. The routers at each end of the virtual link must share a common area.

B. The router at the far end of the virtual link cannot connect to a stub area.

C. The transit area cannot be a stub area.

D. One router must connect to the backbone area.

E. The virtual link must pass through the backbone area.


Options are :

  • A,B,C
  • E,A,B
  • A,C,D
  • B,C,D
  • C,D,E

Answer : A,C,D

Which of the following statements are true regarding the differences between TACACS+ and RADIUS? (Select 2 choices.)

A. TACACS+ encrypts the entire body of a packet, whereas RADIUS encrypts only the password.

B. TACACS+ combines authorization and authentication functions, whereas RADIUS separates authentication, authorization, and accounting functions.

C. TACACS+ provides router command authorization capabilities, whereas RADIUS does not provide router command authorization capabilities.

D. TACACS+ uses UDP, whereas RADIUS uses TCP.

E. TACACS+ is an IETF standard protocol, whereas RADIUS was developed by Cisco.



Options are :

  • A,B
  • A,B
  • A,C
  • C,D
  • B,C

Answer : A,C

300-101 Implementing Cisco IP Routing (ROUTE) Practice Exam Set 2

How long does it take for a PIM network to converge after the failure or addition of an Any cast RP? (Select the best answer.)


Options are :

  • as soon as a multicast source or multicast listener attempts to contact the RP
  • about a second
  • as soon as an administrator manually reconfigures the RPs
  • between one and two minutes
  • as quickly as unicast routing converges

Answer : as quickly as unicast routing converges

Which of the following statements is correct regarding ISAKMP preshared keys that are stored in secure type 6 format? (Select the best answer.)


Options are :

  • Deletion of the master key will unencrypt all of the encrypted passwords.
  • Keys are encrypted as soon as you issue the key configkey password encryption masterkey command.
  • The master key is stored in the router configuration and is encrypted with AES.
  • The master key can be changed after it has been created.

Answer : The master key can be changed after it has been created.

Which of the following statements is true regarding LISP? (Select the best answer.)


Options are :

  • The MR stores the registered EID prefixes and a mapping database.
  • RLOC addresses are the IP addresses and prefixes that identify different routers in the IP network.
  • LISP is used as the control plane protocol for EIGRP OTP.
  • LISP must be running on both ends of the tunnel.
  • LISP requires preconfigured tunnel endpoints.

Answer : RLOC addresses are the IP addresses and prefixes that identify different routers in the IP network.

Cisco CCNP Route 300-101 Practice Tests Set 3

Which of the following is an optional, nontransitive BGP path attribute? (Select the best answer.)


Options are :

  • weight
  • origin
  • aggregator
  • originator ID
  • next hop
  • AS-path

Answer : originator ID

Which of the following are true of both traffic policing and traffic shaping? (Select 2 choices.)

A. Both buffer excess traffic.

B. Both remark excess traffic.

C. Both limit bandwidth utilization.

D. Both use a token bucket.

E. Both smooth traffic.



Options are :

  • A,C
  • A,E
  • A,D
  • B,E
  • B,D
  • B,C
  • C,D

Answer : C,D

Which of the following best defines an RD? (Select the best answer.)


Options are :

  • a path that labeled packets take through an MPLS network
  • a value that enables RFC 4364 VPN customers to use overlapping IP address ranges
  • a routing table instance for a VPN
  • a value that indicates membership in an RFC 4364 VPN

Answer : a value that enables RFC 4364 VPN customers to use overlapping IP address ranges

Cisco CCNP Route 300-101 Practice Tests Set 4

Which of the following can you configure on a router to gather userlevel network resource utilization statistics? (Select the best answer.)


Options are :

  • AutoQoS
  • NetFlow
  • traffic policing
  • CoPP
  • traffic shaping

Answer : NetFlow

Which of the following addresses are not used by EIGRPv6 to form neighbor relationships? (Select the best answer.)


Options are :

  • addresses in the same subnet
  • addresses in different subnets
  • link-local addresses
  • global addresses

Answer : global addresses

Which of the following is true regarding the structure of a VPN ID? (Select the best answer.)


Options are :

  • It begins with a 3-byte OUI and ends with a 4-byte VPN index.
  • It begins with a 6-byte MAC address and ends with a 4-byte IPv4 address.
  • It begins with a 4-byte IPv4 address and ends with a 3-byte OUI.
  • It begins with a 4-byte VPN index and ends with a 6-byte MAC address.
  • It begins with an 8-byte RD and ends with a 4-byte IPv4 address.

Answer : It begins with a 3-byte OUI and ends with a 4-byte VPN index.

400-101 CCIE Routing and Switching Written Practice Exam Set 4

Which of the following values in an MPLS label indicates that this label is the last label in the stack? (Select the best answer.)


Options are :

  • a value of 0 in the S field
  • a value of 255 in the TTL field
  • a value of 1 in the TC field
  • a value of 0 in the TTL field
  • a value of 1 in the
  • a value of 0 in the TC field

Answer : a value of 1 in the

Which of the following commands should you issue from interface configuration mode to associate an NHRP group with a QoS policy map? (Select the best answer.)


Options are :

  • ip nhrp map multicast
  • ip nhrp map multicast dynamic
  • ip nhrp responder
  • ip nhrp map
  • ip nhrp group
  • ip nhrp map group

Answer : ip nhrp map group

Which of the following statements are true regarding the ipv6 ospf authentication command and the ipv6 ospf encryption command? (Select 3 choices.)

A. Both commands require AH.

B. Both commands require ESP.

C. Both commands enable encryption.

D. Both commands enable authentication.

E. Both commands require an SPI value.

F. Both commands must be configured from interface configuration mode.


Options are :

  • C,E,D
  • D,E,F
  • F,D,C
  • A,B,D
  • B,A,C
  • E,A,C

Answer : D,E,F

400-101 CCIE Routing and Switching Written Practice Exam Set 8

You want to ensure that a route in a VRF named ce1 uses the default gateway address of 172.16.0.1, which is commonly accessible from all other addresses on the router but does not exist in the ce1 table. Which of the following commands should you issue? (Select the best answer.)


Options are :

  • ip route vrf 0.0.0.0 0.0.0.0 172.16.0.1 permanent
  • ip route vrf ce1 0.0.0.0 0.0.0.0 172.16.0.1 global
  • ip route vrf 0.0.0.0 0.0.0.0 172.16.0.1 global
  • ip route 0.0.0.0 0.0.0.0 172.16.0.1 permanent
  • ip route 0.0.0.0 0.0.0.0 172.16.0.1 global
  • ip route vrf ce1 0.0.0.0 0.0.0.0 172.16.0.1 permanent

Answer : ip route vrf ce1 0.0.0.0 0.0.0.0 172.16.0.1 global

Which of the following commands creates a single-rate, dual-bucket, three-color policer? (Select the best answer.)


Options are :

  • police 100000 5000 8000 conform-action transmit exceed-action set-dscp-transmit af21 violate-action drop
  • police cir 50000 bc 50000 pir 100000 conform-action transmit exceed action se-tdscp-transmit af21
  • police cir 50000 pir 100000 conform-action transmit exceed-action set dscp-transmit af21 violateactiondrop
  • police 100000 5000 8000 conform-action transmit exceed-action set-dscp-transmit af21

Answer : police 100000 5000 8000 conform-action transmit exceed-action set-dscp-transmit af21 violate-action drop

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions