Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

400-201 Free Demo Questions and Answers

Author: Monika Bergmann
by Monika Bergmann
Posted: Oct 17, 2016

Question: 1

A service provider is implementing Ethernet solutions for clients that are not being provisioned within the MPLS core network. Which solution allows the Service Provider to complete Ethernet circuit provisioning in this scenario?

A. L2TPv3

B. VPLS

C. AToM

D. PPPoE

Answer: A

Explanation:

L2TPv3 defines the L2TP protocol for tunneling Layer 2 payloads over an IP core network using Layer 2 virtual private networks (VPNs). Benefits of this feature include the following:

  • Simplifies deployment of VPNs.
  • Does not require Multiprotocol Label Switching (MPLS) virtual private network (VPN).
  • Supports Layer 2 tunneling over IP for any payload.
  • Supports data encapsulation directly over IP (IP protocol number 115), not using User Datagram Protocol (UDP)
  • Supports point-to-point sessions, not point-to-multipoint or multipoint-to-point sessions
  • Supports sessions between the same Layer 2 protocols, for example Frame Relay-to-Frame Relay or ATM-to-ATM.

Question: 2

Which is the main characteristic of LTE architecture compared to other mobile architectures?

A. Provides supports to deploy Layer 3 MPLS VPN model, where other mobile architectures do not support.

B. Offers node redundancy with the static route configured on the IP NodeB using the HSRP/VRRP virtual ip address.

C. Provides a simpler, less hierarchical model with the capability of simplistically distributing the core gateways.

D. Introduces a hierarchical model with connection-oriented service requirements and one-to-one relationships.

Answer: C

Explanation:

https://books.google.co.in/books?id=-fyjBAAAQBAJ&pg=PA50&lpg=PA50&dq=LTE+Provides+a+simpler,+less+hierarchical+model+with+the+capability+of+simplistically+distributing+the+core+gateways.&source=bl&ots=Bwpk3CQ_jN&sig=2-kgrCA_7hEX3kuvSxWVV2AnAS0&hl=en&sa=X&ved=0CB0Q6AEwAGoVChMI_5La8tbCxwIVgZ6OCh1N7gHa#v=onepage&q=LTE%20Provides%20a%20simpler%2C%20less%20hierarchical%20model%20with%20the%20capability%20of%20simplistically%20distributing%20the%20core%20gateways.&f=false

Question: 3

A Service Provider is offering VoIP services and a service level agreement to customers. Which configuration provides validation to customers that the service level agreement has been honored?

A. ip sla 999 udp-jitter 209.165.200.225 1000 codec g729a tos 160

ip sla schedule 999 life forever start-time now

B. ip sla 999 icmp-jitter 209.165.200.225 tos 160

ip sla schedule 999 life forever start-time now

C. ip sla 999 icmp-jitter 209.165.200.225 tag VoIP-SLA

ip sla schedule 999 life forever start-time now

D. ip sla 999 udp-jitter 209.165.200.225 1000 codec g729a tag VoIP-SLA

ip sla schedule 999 life forever start-time now

Answer: D

Question: 4

A telecom company offers ISPs the ability to resell dynamic IP broadband services over its local loops, but it does not allow the resellers to install broadband network gateways. If an ISP wants to become a reseller but is unable to use NHRP, which tunneling protocol should be implemented?

A. IP in IP

B. IPsec

C. L2TP

D. GRE

Answer: C

Explanation:

However, while OpenVPN can not be used with VoIP, L2TP can be used for VoIP. Only use this if OpenVPN is not available and you are in need of very high security/encryption.

Question: 5

Refer to the exhibit.

The vrf MAINT has been provisioned and used by the Service Provider management network. The engineer discovers that syslog messages are not being received on the syslog server. IP reachability has been validated using ping. Which issue in the configuration must be corrected?

A. logging on must include the vrf MAINT keyword.

B. logging host must include the vrf MAINT keyword.

C. The logging facility must be configured for syslog processing.

D. The route targets that are configured do not match the route distinguisher.

Answer: B

Explanation:

http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srvrfslg.html#wp1059076

Question: 6

Refer to the exhibit.

A service provider has multiple time sources in the environment for NTP. The time source at 10.0.4.1 is intended to be seen as a primary time source. What command can be issued on PE4 to fix the configuration, ensuring the proper NTP source will be issued?

A.ntp peer 10.0.4.1

B.ntp peer 10.0.4.1 prefer

C.ntp server 10.0.4.1 source GigabitEthernet0/0

D.ntp server 10.0.4.1 prefer

Answer: D

Explanation:

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_3ntp.html#wp1106725

Question: 7

Which are the three benefits of using the Yang model? (Choose three.)

A. Reduce lab footprint

B. Improve access to resources

C. Support interoperability that provides a standard way to model management data

D.Support simplified network management applications

E. Provide a scale virtual lab environment

F. Support programmatic interfaces

Answer: C, D, F

Explanation:

https://tools.ietf.org/html/rfc6020#page-11

Question: 8

Refer to the exhibit. How will the redistributed routes on R1 from EIGRP into OSPF be installed in the R4 routing table?

A. as a default route with an E2 route type

B. as a default route with an IA route type

C. as specific routes with an E2 route type

D. as specific routes with an N2 route type

E. as a default route with an N2 route type

Answer: B

Explanation:

http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/6208-nssa.html

http://www.cisco.com/image/gif/paws/6208/nssa.pdf

Question: 9

DRAG DROP

Drag and drop the OAM protocol listed on the left to the correct standard on the right. Not all options will be used.

Answer:

IEEE 802.1ag Connectivity Fault Management ---------> Service Layer OAM

IEEE 802.3ah OAM ------------> Link Layer OAM

MEF-16 E-LMI --------------> Ethernet Local Management Interface

Explanation:

http://www.cisco.com/c/en/us/products/collateral/routers/7600-series routers/prod_white_paper0900aecd804a0266.html

Question: 10

A Service Provider provides a Layer 2 connection that is based on IEEE 802.1ad. When the customer tries to access a switch at the other side of the link by using SSH, the connection fails. What is the cause of this failure?

A. The Service Provider omitted the command l2protocol-tunnel stp.

B. The Service Provider omitted the command l2protocol-tunnel vtp.

C. The Service Provider omitted the command vlan dot1q tag native.

D. The Service Provider omitted the command spanning-tree bpdufilter enable.

Answer: C

Explanation:

https://ccieblog.co.uk/qinq/802-1q-tunnelling-qinq

Question: 11

In an MPLS VPN environment, the QoS marking over the MPLS backbone must be different from the one that is received from the customer. The forwarding on the egress PE is based on the marking that is set by the ingress PE. Which null label and QoS mode can achieve this?

A. MPLS explicit null with pipe mode

B. MPLS implicit null with short pipe mode

C. MPLS implicit null with uniform mode

D. MPLS explicit null with uniform mode

E. MPLS explicit null with short pipe mode

F. MPLS implicit null with pipe mode

Answer: A

Explanation:

http://www.cisco.com/en/US/tech/tk828/technologies_q_and_a_item09186a00800a43f5.shtml#wp27379

http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_te_diffserv/configuration/15-mt/mp-te-diffserv-15-mt-book/mp-diffserv-tun-mode.pdf

https://ccdewiki.wordpress.com/2013/05/31/three-qos-models-in-mpls/

Question: 12

An engineer is deploying RTBH. What is necessary routing constraint required for successful implementation?

A. The trigger device must have an iBGP session with all the clusters/route reflectors in the autonomous system.

B. The trigger device must redistribute the static route pointing to a null interface into the IGP process.

C. The no ip reachables command must be issued on the PE router interface under attack.

D. The attacker’s destination IP address must be routed to a null interface.

E. The eBGP sessions need to set the next-hop attribute value to the trigger device loopback interface.

Answer: A

Explanation:

http://www.cisco.com/web/about/security/intelligence/ipv6_rtbh.html

Old Dumps Actual Test pg no.52 (520 Q)

Question: 13

Refer to the exhibit.

ABC and XYZ MPLS VPN customers are accruing Internet access. Both CEs are sending traffic to the Internet. Which statement about their connectivity is true?

A. Both CEs will have connectivity.

B. Only CE-XYZ will have connectivity.

C. Neither CEs will have connectivity, as both CEs are using the same NATed subnet.

D. Only CE-ABC will have connectivity.

E. Neither CEs will have connectivity, as IAR does not have route back to the NATed subnet.

Answer: D

Question: 14

DRAG DROP

Drag and drop the IOS XR NTP access group options on the left to the right from the least restrictive (top) to the most restrictive order (bottom).

Answer:

  1. peer
  2. serve
  3. serve-only
  4. query-only

Question: 15

Which Cisco IOS XR Virtualization technology provides full isolation between virtualized routing instances for extra control plane resources?

A. HVR

B. SVR

C. SDR

D. DRP

Answer: C

Explanation:

http://www.cisco.com/en/US/solutions/collateral/ns341/ns524/ns562/ns573/white_paper_c11-512753_ns573_Networking_Solutions_White_Paper.html

Question: 16

An engineer wants to configure MPLS TE Fast Reroute with link protection on five routers. Which methodology can reduce configuration on the point of the local repair router and successfully complete the task?

A. Configure a backup tunnel on the PLR.

B. Enable the autotunnel backup feature.

C. Configure a backup tunnel on the tunnel head end router.

D.Enable the autotunnel primary feature.

Answer: B

Explanation:

http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-2/mpls/configuration/guide/b_mpls_cg42crs/b_mpls_cg42crs_chapter_0100.html#concept_F19BEEEFC831436AAC9291A87F9B34E5

Question: 17

Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2?

A. 0

B. 2

C. 3

D. 4

E. No exceeded traffic will reach Site-B.

Answer: E

About the Author

Ou can buy and download our downloadable 712-50 material for 712-50 EC-Council Certified CISO (CCISO) exam quite easily. Just add this study material to your cart, enter your billing information and once you have completed the purchase process

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Monika Bergmann

Monika Bergmann

Member since: Oct 13, 2016
Published articles: 44

Related Articles