[Free] 2017(Apr) Ensurepass Examcollection Cisco 400-201 Latest Dumps 151-160

Ensurepass
2017 April Cisco Official New Released 400-201 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/400-201.html

CCIE Service Provider Written Exam v4.1

QUESTION 151

IPv6 multicast is enabled in a VPLS domain. An operations engineer must reduce the multicast flooding in this VPLS domain. Which feature constrains IPv6 multicast traffic at Layer 2 by configuring Layer 2 ports dynamically to forward IPv6 multicast traffic only to those ports that want to receive it?

 

A.

IGMP version 3

B.

IGMP snooping

C.

MLD querier

D.

MLD version 2

E.

MLD snooping

 

Correct Answer: E

Explanation:

http://blog.ine.com/2009/12/26/ipv6-multicast-multicast-listener-discovery-mld/

http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/200126-High-CPU-Utilization-on-Catalyst-Switche.html

 

 

QUESTION 152

DRAG DROP

Drag and drop the IPFIX terminology on the left to the correct description on the right. Not all options will be used.

 

clip_image002

 

Correct Answer:

clip_image004

 

 

QUESTION 153

With BGP as the PE-CE routing protocol, which command eliminates the need for the service provider to configure autonomous system override the CE?

 

A.

neighbor SoO

B.

neighbor AS-override

C.

neighbor internal-vpn-client

D.

maximum-paths ibgp maximum-number

 

Correct Answer: A

 

 

QUESTION 154

In a Layer 2 VPN service, which is the default behavior of an EVC-based platform with regards to VLAN manipulation?

 

A.

keeps the VLAN tag of the incoming frame

B.

attaches two VLAN tags to the incoming frame

C.

removes the VLAN tag from the incoming frame

D.

removes all the VLAN tags from the incoming frame

E.

sets the VLAN tag of the incoming frame

 

Correct Answer: A

Explanation:

http://www.cisco.com/c/en/us/support/docs/routers/asr-9000-series-aggregation-services-routers/116453-technote-ios-xr-l2vpn-00.html#anc7

 

 

QUESTION 155

Which of the following are steps to configure destination-based Remote Triggered Black Hole (RTBH) filtering? (Choose three.)

 

A.

Configure BGP between trigger and black hole routers.

B.

Configure OSPF between trigger router and black hole routes

C.

Configure all edge routers with static (reserved) host route to Null0

D.

Configure on trigger router to advertise victim host route with community

E.

Activate black hole by redistributing route for victim into BGP with next-hop set to the static (reserved) hostroute configured on edge routers.

 

Correct Answer: ACE

 

 

QUESTION 156

In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups are true? (Choose three)

 

A.

Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.

B.

MDTs are built in customer networks

C.

Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.

D.

MDTs are built in provider networks

E.

The number of MDTs depends on PIM modes of MDT groups.

 

Correct Answer: CDE

 

 

QUESTION 157

Which three statements about the BGP next-hop attribute are true? (Choose three.)

 

A.

EBGP sessions between confederation sub ASs do not modify the next-hop attribute.

B.

By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.

C.

By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector

D.

EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.

E.

By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.

 

Correct Answer: ACE

 

 

QUESTION 158

An engineer is deploying SSHv2 only in band access. Which three options reflect the minimum configuration to enable the SSHv2 services on Cisco routers? (Choose three)

 

A.

Add router hostname on DNS services.

B.

Define a hostname for the device.

C.

Define a domain name for the device.

D.

Create an access list that defines authorized hosts for SSH.

E.

Create crypto keys by using the crypto key generate dsa command.

F.

Configure a key modulus in the global configuration.

 

Correct Answer: BCE

 

 

QUESTION 159

Which are the three benefits of using the Yang model? (Choose three.)

 

A.

Reduce lab footprint

B.

Improve access to resources

C.

Support interoperability that provides a standard way to model management data

D.

Support simplified network management applications

E.

Provide a scale virtual lab environment

F.

Support programmatic interfaces

 

Correct Answer: CDF

Explanation:

https://tools.ietf.org/html/rfc6020#page-11

 

 

QUESTION 160

In a typical three-node OpenStack deployment, which two components are part of the controller node? (Choose two)

 

A.

Neutron Layer 3 agent

B.

Neutron DHCP agent

C.

Identity Service

D.

Neutron Layer 2 agent

E.

Neutron Server plugin

 

Correct Answer: CE

Explanation:

http://docs.openstack.org/icehouse/install-guide/install/yum/content/ch_overview.html

100% Free Download!
—Download Free Demo:400-201 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 400-201 Full Exam PDF and VCE Q&As:436
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE

HOT EXAM!
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com