|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|
[2016 September-New]Cisco 400-201 VCE Exam Dumps 414Q&As [NQ81-NQ90] Download
2016.09 New 400-201: Cisco CCIE Service Provider Written Exam v4.1 Exam Questions Updated Today!
Free Download 400-201 Exam Dumps(PDF & VCE) 414Q&As from Braindump2go.com Today!
100% Real Exam Questions! 100% Exam Pass Guaranteed!
NEW QUESTION 91 – NEW QUESTION 100
1.|2016 New 400-201 Exam Dumps(PDF & VCE) 414Q&As Download:http://www.braindump2go.com/400-201.html
2.|2016 New 400-201 Exam Questions & Answers:https://drive.google.com/folderview?id=0B75b5xYLjSSNRjJsZE5Fd04xYTQ&usp=sharing
What is the minimum hardware configuration of the multishelf Cisco CRS-1 system?
A. One route processor (RP) card and one modular services card (MSC)
B. One distributed route processor (DRP) and one S13 fabric card (SFC)
C. One line card chassis (LCC) and one fabric card chassis (FCC)
D. One route processor (RP) and one fabric card chassis (FCC)
E. One line card chassis (LCC) and one S13 fabric card (SFC)
What is the action of “pop” in the context of MPLS switching?
A. It replaces the top label in the MPLS label stack with a set of labels.
B. It replaces the top label in the MPLS label stack with another value.
C. It adds a top label in MPLS label stack.
D. It removes the top label in the MPLS label stack.
Which two statements about a backup tunnel to avoid the SRLGs of its protected interface are true? (Choose two.)
A. Tunnel is not created unless it avoids SRLGs on the protected interface.
B. If it is not possible to avoid SRLG of the protected interface, backup tunnel will be created anyways.
C. If it is not possible to avoid SRLG of the protected interface, backup tunnel will not be created.
D. Backup tunnel can be created between IGP areas as long as SRLG is configured along the path.
E. Manually created backup tunnel do automatically avoid SRLG of protected interfaces.
A Server Provider is seeing an increasing amount of attacks against its customers. For which kind of attack would an engineer want to design a Backscatter Traceback solution?
A. Rogue DNS/DHCP Servers
B. IP Spoofing
C. Ping of Death
D. Distributed Denial of Service
E. Network Attack TCP/UDP Scan
Which two statements about Unified MPLS are true? (Choose two.)
A. Unified MPLS works on Cisco IOS XR Software only.
B. Unified MPLS extends MPLS across multidomain networks in a scalable manner.
C. New technologies or protocols are not used; only MPLS, LDP, IGP, and BGP are used.
D. ABR loopback prefixes should always be redistributed from the core IGP into the aggregation IGP.
E. The RRs are part of the control path only.
New technologies or protocols are not used here, only MPLS, Label Distribution Protocol (LDP), IGP, and BGP.
Since you do not want to distribute the loopback prefixes of the PE routers from one part of the network into another part, you need to carry the prefixes in BGP.
A Service Provider is designing control policies at the customer edge of the network, in order to prevent usage that exceeds the contracted terms. A new client that is contracted for only 2 Gbps is connecting to the Service Provider edge with a 10 Gbps interface. Which two QoS strategies meet the design goal? (Choose two.)
A. On the service Provider edge, enable traffic shaping on the customer port.
B. On the customer edge device, enable traffic shaping on the interface that is connected to the Service Provider.
C. On the customer edge device, enable policing on the interface that is connected to the Service Provider.
D. On the service Provider edge, enable policing on the customer port.
E. On the service Provider edge, enable WRED on the customer port.
F. On the customer edge, enable WRED on the interface that is connected to the Service Provider.
What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potential exit point out of the area?
A. ATT (Attached) bit
B. ABR (Area Border Rorter) bit
C. PN (Pseudonode) bit
D. P (Partition) bit
E. Down bit
F. IS-Type bit
QoS is applied on an outgoing interface as shown below:
random-detect exponential-weighting-constant 9
random-detect dscp 26 39 117 30
random-detect dscp 28 19 35 20
What will the QoS result be for egress traffic with an average queue depth of 40 that is marked as DSCP AF32?
A. Traffic will be dropped with a random rate less than the one defined by MPD.
B. All traffic will be tail dropped.
C. Traffic will be dropped with a rate of 1 packet out of 20.
D. Traffic will be dropped with a rate of 1 packet out of 30.
Two Service Providers are beginning a merger between AS boundaries to provide MPLS- enabled services between their networks. Customers are using both Service Providers for services and, under certain circumstances; there are requirements to extend Layer 2 VPN circuits between each provider. The providers are in the process of completing the technical merger. However, the MPLS is not supported between the providers. Which action allows MPLS Layer 2 VPN circuits to be built over the inter-AS link?
A. Create a GRE tunnel with the mpls ip command between ASBRs.
B. Create Layer 2 VPN peerings between PE routers from each provider.
C. Create a VPNv4 peering between ASBRs to advertise labels between each provider.
D. Create a sham link between ASBR routers to enable a superbackbone peering for Layer 2 VPN signaling.
Which statement about MPLS TE Fast Reroute (FRR) link protection operation is not true?
A. It requires a next-hop backup tunnel.
B. The backup tunnel terminates on the same tail-end router as the primary tunnel.
C. The point of local repair (PLR) swaps the label and pushes the backup label.
D. The restoration time is expected to be under 50 ms.
E. The backup tunnel can have associated bandwidth capacity
1.Braindump2go|2016 New 400-201 PDF & 400-201 VCE 414Q&As Download:
2.Braindump2go|2016 New 400-201 Questions & Answers: