This page was exported from Braindump2go IT Exam Questions Free Download [ ] Export date:Tue May 21 11:50:47 2019 / +0000 GMT ___________________________________________________ Title: [2016.07 NEW]Free Offer of Braindump2go 400-101 Dumps 1119Q&As Guarantee 100% 400-101 Exam Pass[NQ71-NQ80] --------------------------------------------------- 2016.07 - Cisco Official News:400-101 CCIE Routing and Switching Written Exam 1119Q&As New Updated Today!Instant Free Download 400-101 PDF & 400-101 VCE from!100% Exam Pass Guaranteed! NEW QUESTION 71 - NEW QUESTION 80:1.|Braindump2go 2016.07 Cisco 400-101 CCIE Exam PDF and VCE 1119Q&As Dumps Download: [100% Exam Pass Guaranteed!] 2.|Braindump2go 2016.07 Cisco 400-101 CCIE Exam Questions PDF Download: QUESTION 71Which three statements about the designated router election in IS-IS are true? (Choose three.) A.    If the IS-IS DR fails, a new DR is elected.B.    The IS-IS DR will preempt. If a new router with better priority is added, it just becomes active in the network.C.    If there is a tie in DR priority, the router with a higher IP address wins.D.    If there is a tie in DR priority, the router with a higher MAC address wins.E.    If the DR fails, the BDR is promoted as the DR.F.    The DR is optional in a point-to-point network. Answer: ABD QUESTION 72Which three elements compose a network entity title? (Choose three.) A.    area IDB.    domain IDC.    system IDD.    NSAP selectorE.    MAC addressF.    IP address Answer: ACD QUESTION 73Which statement about shaped round robin queuing is true? A.    Queues with higher configured weights are serviced first.B.    The device waits a period of time, set by the configured weight, before servicing the next queue.C.    The device services a single queue completely before moving on to the next queue.D.    Shaped mode is available on both the ingress and egress queues. Answer: A QUESTION 74Refer to the exhibit. You discover that only 1.5 Mb/s of web traffic can pass during times of congestion on the given network. Which two options are possible reasons for this limitation? (Choose two.) A.    The web traffic class has too little bandwidth reservation.B.    Video traffic is using too much bandwidth.C.    The service-policy is on the wrong interface.D.    The service-policy is going in the wrong direction.E.    The NAT policy is adding too much overhead. Answer: AB QUESTION 75Refer to the exhibit. Which statement about the debug behavior of the device is true?  A.    The device debugs all IP events for    The device sends all debugging information for    The device sends only NTP debugging information to    The device sends debugging information every five seconds. Answer: A QUESTION 76Refer to the exhibit. Which statement about this device configuration is true?  A.    The NMS needs a specific route configured to enable it to reach the Loopback0 interface of the device.B.    The ifindex of the device could be different when the device is reloaded.C.    The device will allow anyone to poll it via the public community.D.    The device configuration requires the AuthNoPriv security level. Answer: B QUESTION 77Which three steps are necessary to enable SSH? (Choose three.) A.    generating an RSA or DSA cryptographic keyB.    configuring the version of SSHC.    configuring a domain nameD.    configuring VTY lines for use with SSHE.    configuring the port for SSH to listen for connectionsF.    generating an AES or SHA cryptographic key Answer: ACD QUESTION 78Which two features does the show ipv6 snooping features command show information about? (Choose two.) A.    RA guardB.    DHCP guardC.    ND inspectionD.    source guard Answer: AC QUESTION 79Refer to the exhibit. Which two statements about how the configuration processes Telnet traffic are true? (Choose two.)  A.    Telnet traffic from to is dropped.B.    All Telnet traffic is dropped.C.    Telnet traffic from to is permitted.D.    Telnet traffic from to is permitted.E.    Telnet traffic is permitted to all IP addresses. Answer: AC QUESTION 80Which three statements are functions that are performed by IKE phase 1? (Choose three.) A.    It builds a secure tunnel to negotiate IKE phase 1 parameters.B.    It establishes IPsec security associations.C.    It authenticates the identities of the IPsec peers.D.    It protects the IKE exchange by negotiating a matching IKE SA policy.E.    It protects the identities of IPsec peers.F.    It negotiates IPsec SA parameters. Answer: CDE !!!RECOMMEND!!! 2016.07 Braindump2go Latest Cisco 400-101 Exam PDF and VCE 1119Q&As Instant Download:  [100% Real Questions Guaranteed!] Cisco 400-101 Exam Questions PDF - Google Drive: --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-07-18 06:25:13 Post date GMT: 2016-07-18 06:25:13 Post modified date: 2016-07-18 06:25:13 Post modified date GMT: 2016-07-18 06:25:13 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from