CCIE Routing and Switching Written v1.0 (400-101)

Page:    1 / 49   
Total 731 questions

Which two options are benefits of EIGRP OTP? (Choose two.)

  • A. It fully supports multicast traffic.
  • B. It allows EIGRP routers to peer across a service provider without the service provider involvement.
  • C. It requires only minimal support from the service provider.
  • D. It allows the customer EIGRP domain to remain contiguous.
  • E. It allows the administrator to use different autonomous system numbers per EIGRP domain.
  • F. It allows EIGRP neighbors to be discovered dynamically.


Answer : BD

Explanation:
EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP"™s involvement. In fact with OTP, the provider won"™t see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer"™s routers. To the customer, the EIGRP domain is contiguous. A customer"™s EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a different location across the cloud. Learned routes feature a next hop of the customer router "" not the provider. Good news for service providers is that customers can deploy EIGRP OTP with their involvement
Reference:
http://ethancbanks.com/2013/08/01/an-overview-of-eigrp-over-the-top-otp/


Refer to the exhibit. Which two statements about this topology are true? (Choose two.)

  • A. Interface FastEthernet 0/0 is the primary path to destination 192.168.23.0/24.
  • B. Destination 192.168.23.0/24 is unable to use interface Fa0/1 as the LFA.
  • C. Only FastEthernet 0/0 is used as the LFA to destination 192.168.23.0/24.
  • D. Only interface FastEthernet 0/1 are used as the LFA to destination 192.168.23.0/24.
  • E. Interface FastEthernet 0/1 is the primary path to destination 192.168.23.0/24.
  • F. The FastEthernet 0/0 and FastEthernet 0/1 interfaces are used as LFAs for destination 192.168.23.0/24.


Answer : AF

Which two statements about redistribution are true? (Choose two.)

  • A. When OSPF traffic is redistributed into BGP, internal and external routes are redistributed.
  • B. When BGP traffic is redistributed into OSPF, the metric is set to 1 unless the metric is defined.
  • C. When EIGRP routes on a CE are redistributed through a PE into BGP, the Cost Community POI is set automatically.
  • D. iBGP routes automatically redistribute into the IGP if the routes are in the routing table.
  • E. When BGP traffic is redistributed into OSPF, eBGP and iBGP routes are advertised.
  • F. When EIGRP traffic is redistributed into BGP, a default metric is required.


Answer : BC

DRAG DROP -
Drag and drop the OSPF network type on the left to the correct category of timers on the right.
Select and Place:




Answer :

Which option is an incorrect design consideration when deploying OSPF areas?

  • A. area 1 - area 0 - MPLS VPN backbone - area 0 - area 2
  • B. area 1 - MPLS VPN backbone - area2
  • C. area 1 - MPLS VPN backbone - area 1
  • D. area 2 - area 0 - MPLS VPN backbone - area 1
  • E. area 0- area 2 - MPLS VPN superbackbone - area 1


Answer : E

Which two statements about RIPng are true? (Choose two.)

  • A. Both inbound and outbound route filtering can be implemented on a single interface.
  • B. A route with a metric of 15 is advertised as unreachable.
  • C. RIPng can support as many as 8 equal-cost routes.
  • D. 16 is the maximum metric it can advertise.
  • E. RIPng can support as many as 32 equal-cost routes


Answer : AD

DRAG DROP -
Drag each OSPFv2 SA parameter on the left to the corresponding description on the right.
Select and Place:




Answer :

Explanation:
Key Identifier (KeyID)
This is an 8-bit unsigned value used to uniquely identify an OSPFv2 SA and is configured either by the router administrator (or, in the future, possibly by some key management protocol specified by the IETF). The receiver uses this to locate the appropriate OSPFv2 SA to use. The sender puts this KeyID value in the OSPF packet based on the active OSPF configuration.

Authentication Algorithm -
This indicates the authentication algorithm (and also the cryptographic mode, such as HMAC) to be used. This information SHOULD never be sent over the wire in cleartext form. At present, valid values are Keyed-MD5, HMAC-SHA-1,HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512.

Authentication Key -
This is the cryptographic key used for cryptographic authentication with this OSPFv2 SA. This value SHOULDnever be sent over the wire in cleartext form. This is noted as "K" in Section 3.3below.

Key Start Accept -
The time that this OSPF router will accept packets that have been created with this OSPF Security Association.

Key Start Generate -
The time that this OSPF router will begin using this OSPF Security
Association for OSPF packet generation.

Key Stop Generate -
The time that this OSPF router will stop using this OSPF Security
Association for OSPF packet generation.

Key Stop Accept -
The time that this OSPF router will stop accepting packets
generated with this OSPF Security Association.

How does EIGRP derive the metric for manual summary routes?

  • A. It uses the best metric vectors of all component routes in the topology table.
  • B. It uses the worst metric vectors of all component routes in the topology table.
  • C. It uses the worst composite metric of any component route in the topology table.
  • D. It uses the best composite metric of any component route in the topology table.


Answer : A

When is it useful to disable split horizon on an EIGRP interface?

  • A. Disable it when you want to send routes that are learned from another routing protocol to peer on the same interface.
  • B. Disable it when you want to provide additional backup paths in your network.
  • C. It is never advisable to disable split horizon on an EIGRP interface.
  • D. Disable it when you need to send updates to peers on the interface on which the updates were received.


Answer : D


Refer to the exhibit. Which two route types are advertised by a router with this configuration? (Choose two.)

  • A. connected
  • B. external
  • C. summary
  • D. redistributed
  • E. static


Answer : AC

Explanation:
A router that is configured as a stub with the eigrp stub command shares connected and summary routing information with all neighbor routers by default.

What are two mechanisms that directed ARP uses to help resolve IP addresses to hardware addresses? (Choose two.)

  • A. It uses ICMP redirects to advertise next-hop addresses to foreign hosts.
  • B. It removes address-resolution restrictions, allowing dynamic protocols to advertise routing information for the device loopback address.
  • C. It uses a proxy mechanism to allow a device to respond to ARP requests for the addresses of other devices.
  • D. It removes address-resolution restrictions, allowing dynamic protocols to advertise routing information for the next-hop address.
  • E. It uses a series of ICMP echo messages to relay next-hop addresses.


Answer : AD

Refer to the exhibit -
%DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.0.0.1 (FastEthernet0/0) is down:

Interface Goodbye received -
Which option describes the meaning of this console message?

  • A. An EIGRP hold timer has expired.
  • B. FastEthernet0/0 has interface errors.
  • C. An EIGRP process has been shut down.
  • D. An interface has gone down.


Answer : A

Which statement about the RPF interface in a BIDIR-PIM network is true?

  • A. There is no RPF interface concept in BIDIR-PIM networks.
  • B. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the source.
  • C. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the PIM rendezvous point.
  • D. In a BIDIR-PIM network, the RPF interface can be the interface that is used to reach the PIM rendezvous point or the interface that is used to reach the source.


Answer : C

Explanation:
RPF stands for "Reverse Path Forwarding". The RPF Interface of a router with respect to an address is the interface that the MRIB indicates should be used to reach that address. In the case of a BIDIR-PIM multicast group, the RPF interface is determined by looking up the Rendezvous Point Address in the MRIB. The
RPF information determines the interface of the router that would be used to send packets towards the Rendezvous Point Link for the group.
Reference:
https://tools.ietf.org/html/rfc5015

Which two message types allow PIM snooping to forward multicast traffic? (Choose two.)

  • A. hello messages
  • B. leave messages
  • C. membership query messages
  • D. bidirectional PIM DF election messages


Answer : AD

Refer to the exhibit.


R1 and R2 both advertise 10.50.1.0/24 to R3 and R4 as shown. R1 is the primary path. Which path does traffic take from the R4 data center to the file server?

  • A. All traffic travels from R4 to R2 to the file server.
  • B. All traffic travels from R4 to R3 to R1 to the file server.
  • C. Traffic is load-balanced from R4 to R2 and R3. Traffic that is directed to R3 then continues to R1 to the file server. Traffic that is directed to R2 continues to the fileserver.
  • D. All traffic travels from R4 to R2 to R1 to the file server.


Answer : A

Page:    1 / 49   
Total 731 questions