[2017-May-New]400-101 Free Dumps Can Be Downloaded in Braindump2go[281-290]
2017 May New | Cisco 400-101 Exam Dumps with PDF and VCE Free Updated in www.Braindump2go.com Today!100% Real Exam Questions! 100% Exam Pass Guaranteed!
1.|2017 New Version 400-101 Exam Dumps (PDF & VCE) 328Q&As Download:
http://www.braindump2go.com/400-101.html
2.|2017 New Version 400-101 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNWWsyOTJ2UHJFVVU?usp=sharing
QUESTION 281
Which two statements about static routing are ture?(Choose two)
A. It is highly scalable as networks grow
B. It reduces configuration errors
C. It can be implemented more quickly that dynamic routing
D. It provides better security than dynamic routing
E. It requires less bandwidth and fewer CPU cycles than dynamic routing protocols
Answer: DE
QUESTION 282
Which value does VPLS use to make forwarding decisions?
A. destination IP address of the packet
B. destination MAC of the Ethernet frame
C. source IP address of the packet
D. source MAC of the Ethernet frame
Answer: B
QUESTION 283
Which three configuration settings must match for switches to be in the same MST region?(Choose three)
A. password
B. region name
C. VLAN-to-instance assignment
D. revision number
E. VLAN names
F. domain name
Answer: BCD
QUESTION 285
Which two statements about IPv6 multicast address are true?(Choose two)
A. An IPv6 host must join the solicited-node multicast group for every unicast and anycast address on the node
B. IPv6 routers update their routing tables when they receive a redirect message on a segment
C. Solicited-node multicast addresses are based on the lower-order 24 bits of the unicast or anycast address
D. They perform neighbor unreachability detection only for neighbors that send multicast packets
E. Neighbors respone to solicitation messages by sending Router Advertisement message
F. They use UDP packets to perform neighbor unreachability detection
Answer: AC
QUESTION 286
Which type of access list allows granular session filtering for upper-level protocols?
A. reflexive access lists
B. context-based access lists
C. content-based access lists
D. extended access lists
Answer: A
QUESTION 287
In which scenario can asymmetric routing occur?
A. redundant routers running VRRP
B. active/standby firewall setup
C. active/active firewall setup
D. single path in and out of the network
Answer: C
QUESTION 289
Which three of the following secrity controls would you take into consideration when implementing IoT capabilities?(Choose three)
A. Layered Security Approach
B. Place security above functionality
C. Define lifecycle controls for IoT devices
D. Privacy Impact Assessment
E. Change passwords every 90 days
F. Implement Intrusion Detection Systems on IoT devices
Answer: ACD
QUESTION 290
A network engineer enables OSPF on a Frame Relay WAN connection to various remote sites,but no OSPF adjacencies come up.Which two actions are possible solutions for this issue?(Choose two)
A. Change the network type to nonbroadcast multipoint access
B. Configure the neighbor command under OSPF process for each remote site
C. Ensure that the OSPF process number matches among all remote sites
D. Enable virtual links
E. Change the network type to point-to-multipoint under WAN interface
Answer: BE
!!!RECOMMEND!!!
1.|2017 New Version 400-101 Exam Dumps (PDF & VCE) 328Q&As Download:
http://www.braindump2go.com/400-101.html
2.|2017 New Version 400-101 Study Guide Video:
https://youtu.be/xcUjk7uBioM