Free Download New Updated Cisco CCIE R&S 400-101 Real Exam Questions and Answers 51-60

Ensurepass

QUESTION 51

Refer to the exhibit. R2 is mutually redistributing between EIGRP and BGP. Which configuration is necessary to enable R1 to see routes from R3?

 

clip_image001

 

A.

The R3 configuration must include ebgp-multihop to the neighbor statement for R2.

B.

The R2 BGP configuration must include bgp redistribute-internal.

C.

R1 must be configured with next-hop-self for the neighbor going to R2.

D.

The AS numbers configured on R1 and R2 must match.

 

Correct Answer: B

 

 

QUESTION 52

What is the purpose of EIGRP summary leaking?

 

A.

to allow a summary to be advertised conditionally on specific criteria

B.

to allow a component of a summary to be advertised in addition to the summary

C.

to allow overlapping summaries to exist on a single interface

D.

to modify the metric of the summary based on which components of the summary are operational

 

Correct Answer: B

 

 

QUESTION 53

Refer to the exhibit. You have just created a new VRF on PE3. You have enabled debug ip bgp vpnv4 unicast updates on PE1, and you can see the route in the debug, but not in the BGP VPNv4 table. Which two statements are true? (Choose two.)

 

clip_image003

 

A.

VPNv4 is not configured between PE1 and PE3.

B.

address-family ipv4 vrf is not configured on PE3.

C.

After you configure route-target import 999:999 for a VRF on PE3, the route will be accepted.

D.

PE1 will reject the route due to automatic route filtering.

E.

After you configure route-target import 999:999 for a VRF on PE1, the route will be accepted.

 

Correct Answer: DE

 

 

QUESTION 54

Refer to the exhibit. NHRP registration is failing; what might be the problem?

 

clip_image005

 

A.

invalid IP addressing

B.

fragmentation

C.

incorrect NHRP mapping

D.

incorrect NHRP authentication

 

Correct Answer: D

 

 

QUESTION 55

In GETVPN, which key is used to secure the control plane?

 

A.

Traffic Encryption Key (TEK)

B.

content encryption key (CEK)

C.

message encryption key (MEK)

D.

Key Encryption Key (KEK).

 

Correct Answer: D

 

 

QUESTION 56

Which statement is true comparing L2TPv3 to EoMPLS?

 

A.

L2TPv3 requires OSPF routing, whereas EoMPLS does not.

B.

EoMPLS requires BGP routing, whereas L2TPv3 does not.

C.

L2TPv3 carries L2 frames inside MPLS tagged packets, whereas EoMPLS carries L2 frames inside IPv4 packets.

D.

L2TPv3 carries L2 frames inside IPv4 packets, whereas EoMPLS carries L2 frames inside MPLS packets.

 

Correct Answer: D

 

 

QUESTION 57

Which statement is true about VPLS?

 

A.

MPLS is not required for VPLS to work.

B.

VPLS carries packets as Layer 3 multicast.

C.

VPLS has been introduced to address some shortcomings of OTV.

D.

VPLS requires an MPLS network.

 

Correct Answer: D

 

 

QUESTION 58

Refer to the exhibit. Service provider SP 1 is running the MPLS-VPN service. The MPLS core network has MP- BGP configured with RR-1 as route reflector. What will be the effect on traffic between PE1 and PE2 if router P1 goes down?

 

clip_image007

 

A.

No effect, because all traffic between PE1 and PE2 will be rerouted through P2.

B.

No effect, because P1 was not the only P router in the forwarding path of traffic.

C.

No effect, because RR-1 will find an alternative path for MP-BGP sessions to PE-1 and PE-2.

D.

All traffic will be lost because RR-1 will lose the MP-BGP sessions to PE-1 and PE-2.

 

Correct Answer: D

 

 

QUESTION 59

According to RFC 4577, OSPF for BGP/MPLS IP VPNs, when must the down bit be set?

 

A.

when an OSPF route is distributed from the PE to the CE, for Type 3 LSAs

B.

when an OSPF route is distributed from the PE to the CE, for Type 5 LSAs

C.

when an OSPF route is distributed from the PE to the CE, for Type 3 and Type 5 LSAs

D.

when an OSPF route is distributed from the PE to the CE, for all types of LSAs

 

Correct Answer: C

 

 

QUESTION 60

Refer to the exhibit. What is a possible reason for the IPSEC tunnel not establishing?

 

clip_image008

 

A.

The peer is unreachable.

B.

The transform sets do not match.

C.

The proxy IDs are invalid.

D.

The access lists do not match.

 

Correct Answer: D

 

Instant Access to Download Latest Complete Collection of Cisco CCIE R&S 400-101 Real Exam

Try Cisco CCIE R&S 400-101 Free Demo