2017 May New: Cisco 400-201 Exam Dumps with VCE and PDF Free Updated in www.Braindump2go.com  Today!
100% Real Exam Questions! 100% Exam Pass Guaranteed!

1.|2017 Version New 400-201 Exam Dumps (PDF & VCE) 627Q&As Download:

2.|2017 Version New 400-201 Exam Questions & Answers Download:


Which four services use the inner labels of an MPLS label stack? (Choose four)

B.    switching path in MPLS core
C.    Cisco MPLS Traffic Engineering and Fast Reroute
D.    MPLS over ATM
E.    VPN over Traffic Engineering core
F.    any transport over MPLS

Answer: ACEF

What BGP feature improves on DDOS mitigation by allowing instructions that are more granular and allow for source address, destination, address, L4 details, and packet specifics to be analyzed?

A.    RCMD
B.    RTBH
C.    BGP Flowspec
D.    BGPSec

Answer: C

In which of the following BGP-related events is an End-of-RIB (EOR) message sent? (Choose two.)

A.    Following a link flap in the BGP speaker’s AS
B.    During initial convergence.
C.    Following a Route Processor Switchover.
D.    Just before sending a CEASE message to tear down the session.
E.    During capability negotiation

Answer: BC

Which description of BGP authentication is true?

A.    MD5 has been used by BGP to encrypt BGP update packets.
B.    BGP uses a message-digest algorithm to authenticate BGP peers
C.    A plain-text password authentication is an option of BGP authentication
D.    EBGP peers authentication is faster than IBGP peers authentication
E.    BGP uses public key and private key to authenticate BGP peers.

Answer: B
BGP Authentication
BGP supports MD5 authentication between neighbors, using a shared password. It is configured under BGP router configuration mode with the command neighbor {ip-address | peer-group-name} password password.
When authentication is configured, BGP authenticates every TCP segment from its peer and checks the source of each routing update. Most ISPs require authentication for their EBGP peers.

Refer to the exhibit. A network engineer must configure BFD for IS-IS between R1 and R2. In case the primary link fails, the convergence time should be less than a second.
Which two IOS commands are required to meet this requirement? (Choose two.)

A.    isis bfd
B.    bfd minimum-interval 250
C.    bfd interval 250 min_rx 250 multiplier 3
D.    bfd multiplier 3
E.    bfd interval 250 min_rx 250 multiplier 4
F.    bfd fast-detect ipv4

Answer: AC

Refer to the exhibit. The referenced TE tunnels compete for bandwidth requirements over the limited available bandwidth that is provisioned. Which core MPLS component erases a conflict and provides admission control for any new added TE tunnel?

A.    link management
B.    link attributes
C.    MPLS TE priorities
D.    RSVP

Answer: C
TE Priority allows you to give setup priority to tunnels.

Refer to the exhibit. OSPFv3 is already running, and R1 has added a new subnet (loopback 11). What is the reason code on R4 when executing the command show ipv6 ospf statistics?

A.    P (partial)
B.    N (network)
C.    R (router)
D.    L (link)

Answer: C

Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.)

A.    In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.
B.    It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.
C.    It offers two major changes over traditional Ethernet to make it suitable for clock distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution, management, traceability, and failover.
D.    SyncE is a Cisco proprietary ToD technology where IEEE 1588 is a industry standard recommended for interoperability across vendor devices.
E.    IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic.

Answer: AB

What are the four key design requirements for mobile IP backhaul? (Choose four.)

A.    X2 interface turning point
B.    bandwidth
C.    Layer 2 Tunneling
D.    native IPv6 support
E.    DiffServ QoS
F.    MPLS-enabled interface
G.    network timing distribution and recovery
H.    mandatory Layer 3 access up to a cell site

Answer: CDGH

Refer to the exhibit. The Service Provider does not have IPv6 support in the core, however it does have MPLS support. Customer requires IPv6 connectivity in all sites including Internet access. Without a requirement to create VRF, which method is preferred to support IPv6 traffic between these sites?

A.    6VPE
B.    H-VPLS
C.    L2TPv3
D.    VPLS
E.    6CE
F.    6PE

Answer: F

Which 4 statements regarding MPLS Label Stack Encoding is true?

A.    A value of 4 represents the “Implicit NULL Label.”
B.    A value of 0 represents the “IPv4 Explicit NULL Label.”
C.    A value of 1 represents the “Router Alert Label”.
D.    A value of 2 represents the “IPv6 Explicit NULL Label”
E.    A value of 1 represents the “IPv1 Explicit NULL Label”
F.    A value of 3 represents the “Implicit NULL Label”

Answer: BCDF
A value of 0 represents the “IPv4 Explicit NULL Label”. This label indicates that the label stack must be popped, and the packet forwarding must be based on the IPv4 header. This helps to keep Exp bits safe until the egress router. It is used in MPLS based QoS. A value of 1 represents the “Router Alert Label”. When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing. The actual packet forwarding is determined by the label beneath it in the stack. However, if the packet is forwarded further, the Router Alert Label should be pushed back onto the label stack before forwarding. The use of this label is analogous to the use of the “Router Alert Option” in IP packets (for example, ping with record route option)
A value of 2 represents the “IPv6 Explicit NULL Label”. It indicates that the label stack must be popped, and the packet forwarding must be based on the IPv6 header. A value of 3 represents the “Implicit NULL Label”. This is a label that an LSR can assign and distribute.
However, it never actually appears in the encapsulation. It indicates that the LSR pops the top label from the stack and forwards the rest of the packet (labeled or unlabeled) through the outgoing interface (as per the entry in Lfib). Although this value might never appear in the encapsulation, it needs to be specified in the Label Distribution Protocol, so a value is reserved.

What are three actions that the control word performs in MPLS AToM? (Choose three.)

A.    is used to identify the VC label
B.    is used for padding small packets
C.    preserves the sequence of the transported frames
D.    facilitates the load balancing of AToM packets in the MPLS backbone network
E.    carries control bits of the Layer 3 header of the transported protocol
F.    is used to identify the tunnel label

Answer: BCD

With EIGRP DUAL, a feasible successor is considered loop-free if which condition is true?

A.    Its AD is equal to the metric of the successor
B.    Its AD is less than the successor’s FD
C.    Its AD is equal to the successor’s FD
D.    Its AD is greater than the successor’s FD
E.    Its FD is equal to the metric of the successor

Answer: B


1.|2017 Version New 400-201 Exam Dumps (PDF & VCE) 627Q&As Download:

2.|2017 Version New 400-201 Study Guide Video: