Top 10 questions pool 400-101 for IT engineers (331 to 340)
Q331. Which two statements about 802.1Q tunneling are true? (Choose two.)
A. It requires a system MTU of at least 1504 bytes.
B. The default configuration sends Cisco Discovery Protocol, STP, and VTP information.
C. Traffic that traverses the tunnel is encrypted.
D. It is supported on private VLAN ports.
E. MAC-based QoS and UDLD are supported on tunnel ports.
F. Its maximum allowable system MTU is 1546 bytes.
Q332. DRAG DROP
Drag each OSPF route-type identifier on the left to its description on the right.
Q333. Which statement about the OSPF Loop-Free Alternate feature is true?
A. It is supported on routers that are configured with virtual links.
B. It is supported in VRF OSPF instances.
C. It is supported when a traffic engineering tunnel interface is protected.
D. It is supported when traffic can be redirected to a primary neighbor.
Restrictions for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
. The OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute feature is not supported on devices that are virtual links headends.
. The feature is supported only in global VPN routing and forwarding (VRF) OSPF
. The only supported tunneling method is MPLS.
. You cannot configure a traffic engineering (TE) tunnel interface as a protected interface. Use the MPLS Traffic Engineering—Fast Reroute Link and Node Protection feature to protect these tunnels. For more information, see the “MPLS Traffic Engineering—Fast Reroute Link and Node Protection” section in the Multiprotocol Label Switching Configuration Guide.
. You can configure a TE tunnel interface in a repair path, but OSPF will not verify the tunnel’s placement; you must ensure that it is not crossing the physical interface that it is intended to protect.
. Not all routes can have repair paths. Multipath primary routes might have repair paths for all, some, or no primary paths, depending on the network topology, the connectivity of the computing router, and the attributes required of repair paths.
. Devices that can be selected as tunnel termination points must have a /32 address advertised in the area in which remote LFA is enabled. This address will be used as a tunnel termination IP. If the device does not advertise a /32 address, it may not be used for remote LFA tunnel termination.
. All devices in the network that can be selected as tunnel termination points must be configured to accept targeted LDP sessions using the mpls ldp discovery targeted-hello accept command.
Q334. Which three options are sources from which a SPAN session can copy traffic? (Choose three.)
E. primary IP addresses
F. secondary IP addresses
. SPAN Sources
The interfaces from which traffic can be monitored are called SPAN sources. Sources designate the traffic to monitor and whether to copy ingress, egress, or both directions of traffic. SPAN sources include the following:
. Ethernet ports
. Port channels
. The inband interface to the control plane CPU — You can monitor the inband interface only from the default VDC. Inband traffic from all VDCs is monitored.
. VLANs — When a VLAN is specified as a SPAN source, all supported interfaces in the VLAN are SPAN sources.
. Remote SPAN (RSPAN) VLANs
. Fabric port channels connected to the Cisco Nexus 2000 Series Fabric Extender .
Satellite ports and host interface port channels on the Cisco Nexus 2000 Series Fabric Extender
— These interfaces are supported in Layer 2 access mode, Layer 2 trunk mode, and Layer 3 mode.
Q335. Refer to the exhibit.
Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A. The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
B. Cisco PfR is monitoring the prefix via passive NetFlow mode only.
C. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
D. The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.
Q336. Refer to the exhibit.
RIPv2 authentication is failing on a device with this configuration. Which two actions can you take to enable it? (Choose two.)
A. Set the RIP authentication mode to text.
B. Set the RIP authentication mode to MD5.
C. Configure the password encryption for the key.
D. Set the password encryption to AES.
See the reference link below for information on configuring RIPv2 authentication, including both test and MD5 modes.
Q337. Which three features are common to OSPF and IS-IS? (Choose three.)
A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree.
B. They both use DR and BDR in the broadcast network.
C. They both use hello packets to form and maintain adjacencies.
D. They both use NSSA and stub type areas to scale the network design.
E. They both have areas to form a two-level hierarchical topology.
Q338. Which two metrics are measured with active probes when PfR voice traffic optimization is in use? (Choose two.)
Q339. Which two statements about the max-age time in IS-IS are true? (Choose two.)
A. The IS-IS max-age time is 20 minutes by default.
B. The IS-IS max-age time is 60 minutes by default.
C. The IS-IS max-age time increments from zero to max-age.
D. The IS-IS max-age time decrements from max-age to zero.
Q340. Which three features require Cisco Express Forwarding? (Choose three.)
QoS Features That Require CEF
These class-based QoS features are supported only on routers that run CEF.
.Network Based Application Recognition (NBAR) provides intelligent network classification. For more information, refer to Network Based Application Recognition.
. The AutoQoS -VoIP feature simplifies and speeds up the implementation and provisioning of QoS for VoIP traffic. This feature is enabled with the help of the auto qos voip command. CEF must be enabled at the interface or ATM PVC before the auto qos command can be used. For more information about this feature and its prerequisites, refer to AutoQoS -VoIP.
From MPLS Fundamentals - Luc De Ghein
Why Is CEF Needed in MPLS Networks?
Concerning MPLS, CEF is special for a certain reason; otherwise, this book would not explicitly cover it. Labeled packets that enter the router are switched according to the label forwarding information base (LFIB) on the router. IP packets that enter the router are switched according to the CEF table on the router. Regardless of whether the packet is switched according to the LFIB or the CEF table, the outgoing packet can be a labeled packet or an IP packet