Free Download New Updated Cisco CCIE R&S 400-101 Real Exam Questions and Answers 141-150

Ensurepass

QUESTION 141

What are the minimal configuration steps that are required to configure EIGRP HMAC- SHA2 authentication?

 

A.

classic router mode, interface XX, authentication mode hmac-sha-256 <password>

B.

named router mode, address-family statement, authentication mode hmac-sha-256 <password>

C.

named router mode, address-family statement, af-interface default, authentication mode hmac-sha-256 <password>

D.

named router mode, address-family statement, authentication mode hmac-sha-256 <password>

 

Correct Answer: C

 

 

QUESTION 142

Refer to the exhibit. Which statement is true?

 

clip_image001

 

A.

R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20.

B.

The default route 0.0.0.0/0 is available in the IPv4 routing table.

C.

R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available .

D.

R1 has preferred-path configured for the pseudowire.

 

Correct Answer: D

 

 

QUESTION 143

For which kind of MPLS deployment is the next-hop-self all keyword used on a BGP neighbor command?

 

A.

6VPE

B.

MPLS Carrier’s carrier

C.

inter-AS MPLS VPN option D

D.

inter-AS MPLS VPN option C

E.

Unified MPLS

 

Correct Answer: E

 

 

 

QUESTION 144

Refer to the exhibit. How many EIGRP routes will appear in the routing table of R2?

 

clip_image003

 

A.

0

B.

1

C.

2

D.

3

 

Correct Answer: A

 

 

QUESTION 145

What is a reason for 6PE to use two MPLS labels in the data plane instead of one?

 

A.

6PE allows penultimate hop popping and has a requirement that all P routers do not have to be IPv6 aware.

B.

6PE does not allow penultimate hop popping.

C.

It allows MPLS traffic engineering to work in a 6PE network.

D.

It allows 6PE to work in an MPLS network where 6VPE is also deployed.

 

Correct Answer: A

 

 

QUESTION 146

Which two configuration changes should be made on the OTP interface of an EIGRP OTP route reflector? (Choose two.)

 

A.

passive-interface

B.

no split-horizon

C.

no next-hop-self

D.

hello-interval 60, hold-time 180

 

Correct Answer: BC

 

 

QUESTION 147

Which statement about the function of poison reverse in EIGRP is true?

 

A.

It tells peers to remove paths that previously might have pointed to this router.

B.

It tells peers to remove paths to save memory and bandwidth.

C.

It provides reverse path information for multicast routing.

D.

It tells peers that a prefix is no longer reachable.

 

Correct Answer: A

 

 

QUESTION 148

What is the preferred method to improve neighbor loss detection in EIGRP?

 

A.

EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required.

B.

BFD should be used on interfaces that support it for rapid neighbor loss detection.

C.

Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.

D.

Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.

 

Correct Answer: B

 

 

QUESTION 149

How does EIGRP derive the metric for manual summary routes?

 

A.

It uses the best composite metric of any component route in the topology table.

B.

It uses the worst composite metric of any component route in the topology table.

C.

It uses the best metric vectors of all component routes in the topology table.

D.

It uses the worst metric vectors of all component routes in the topology table.

 

Correct Answer: A

 

 

QUESTION 150

EIGRP allows configuration of multiple MD5 keys for packet authentication to support easy rollover from an old key to a new key. Which two statements are true regarding the usage of multiple authentication keys? (Choose two.)

 

A.

Received packets are authenticated by the key with the smallest key ID.

B.

Sent packets are authenticated by all valid keys, which means that each packet is replicated as many times as the number of existing valid keys.

C.

Received packets are authenticated by any valid key that is chosen.

D.

Sent packets are authenticated by the key with the smallest key ID.

 

Correct Answer: CD

 

Instant Access to Download Latest Complete Collection of Cisco CCIE R&S 400-101 Real Exam

Try Cisco CCIE R&S 400-101 Free Demo