May 2017 updated: Examcollection Cisco 400-201 actual test 101-110

      Comments Off on May 2017 updated: Examcollection Cisco 400-201 actual test 101-110

Pass4sure 400-201 Questions are updated and all 400-201 answers are verified by experts. Once you have completely prepared with our 400-201 exam prep kits you will be ready for the real 400-201 exam without a problem. We have Avant-garde Cisco 400-201 dumps study guide. PASSED 400-201 First attempt! Here What I Did.


Free VCE & PDF File for Cisco 400-201 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 400-201 Exam Dumps (PDF & VCE):
Available on:

Q101. The following congestion avoidance configuration has been applied on an outgoing interface: 

Which is the result of the egress packets marked as DSCP AF32 when the average queue depth is 40? 

A. It will be dropped with a random rate less than the one defined by MPD. 

B. It will be tail dropped. 

C. It will be dropped with a rate of 1 packet out of 30. 

D. It will be dropped with a rate of 1 packet out of 20. 


Q102. The product team at an ISP that offers VoIP services wants to add two-way video conferencing to their product offering. Which three QoS methods can be applied for real-time traffic on WAN links with speeds that are slower than 768 Kbps? (Choose three.) 

A. Apply MLP link fragmentation and interleaving to the interface. 

B. Apply LLQ with both voice traffic and video traffic in the same priority queue. 

C. Apply CBWFQ with VoIP traffic in its own class, which is marked with a PHB value of EF. 

D. Apply CBWFQ with video traffic in its own class, which is marked with a PHB value of AF41. 

E. Apply voice-adaptive fragmentation to ensure that large video packets are fragmented and interleaved. 

F. Apply LLQ with video traffic that is dedicated in the priority queue. 

Answer: A,C,D 

Explanation: S-SRND-Book/WANQoS.html 

Q103. A service provider is implementing Ethernet solutions for clients that are not being provisioned within the MPLS core network. Which solution allows the Service Provider to complete Ethernet circuit provisioning in this scenario? 

A. L2TPv3 


C. AToM 




L2TPv3 defines the L2TP protocol for tunneling Layer 2 payloads over an IP core network using Layer 2 virtual private networks (VPNs). Benefits of this feature include the following: 

. Simplifies deployment of VPNs. 

. Does not require Multiprotocol Label Switching (MPLS) virtual private network (VPN). 

. Supports Layer 2 tunneling over IP for any payload. 

. Supports data encapsulation directly over IP (IP protocol number 115), not using User Datagram Protocol (UDP) . 

Supports point-to-point sessions, not point-to-multipoint or multipoint-to-point sessions . 

Supports sessions between the same Layer 2 protocols, for example Frame Relay-to-Frame Relay or ATM-to-ATM. 

Q104. Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2? 

A. 0 

B. 2 

C. 3 

D. 4 

E. No exceeded traffic will reach Site-B. 


Q105. Refer to the exhibit. 

A CE connected to a service provider has an agreement to use 512Mbps of bandwidth. Which QoS configuration must be modified to ensure that the traffic matches the agreed bandwidth? 

A. Apply the same CE QoS configuration on PE on inbound direction. 

B. Change the outbound direction of the service-policy to inbound for ingress traffic shaping. 

C. Treat the class-default as best-effort by removing the shape average 512000 command 

D. Replace the shape keyword with police keyword in both classes 

E. Reconfigure the policy-map as a nested policy with the shaping applied as a parent for all child policies 


Q106. On a Cisco ASR 1000 Series, which hardware component is used to build and distribute the forwarding plane information to all line cards? 

A. RP 





Q107. In order to prevent malicious traffic flows, how does BGPsec protect prefix advertisements? 

A. It validates only the originating AS. 

B. It validates routes with encryption. 

C. It validates the AS path. 

D. It validates the next-hop AS. 


Q108. Customers connecting to a Service Provider for Internet access are intending to implement redundant peering. The design requirements call for preferring a primary link for both ingress and egress traffic. Secondary links should be used only during primary outages. What two BGP deployment options will accomplish this design goal? (Choose two.) 

A. On the router handling the secondary link, advertise routes with a MED value of 0. 

B. On the router handling the primary link, set the weight for all incoming routes to be a value of 0. 

C. On the router handling the secondary link, advertise all routes with a longer AS-PATH value. 

D. On the router handling the primary link, advertise all routes with a longer AS-PATH value. 

E. On the router handling the secondary link, set the local preference for all incoming routes to be a value of 0. 

Answer: C,E 

Q109. Which two statements about Unified MPLS are true? (Choose two.) 

A. Unified MPLS works on Cisco IOS XR Software only. 

B. Unified MPLS extends MPLS across multidomain networks in a scalable manner. 

C. New technologies or protocols are not used; only MPLS, LDP, IGP, and BGP are used. 

D. ABR loopback prefixes should always be redistributed from the core IGP into the aggregation IGP. 

E. The RRs are part of the control path only. 

Answer: B,D 


Q110. Which are the four main functions of the Cisco IOS XR System Manager? (Choose four) 

A. performs system monitoring 

B. is the main IOS XR component for device drivers and software installation management 

C. starts, restarts, and terminates processes in response to user configuration or RP failover 

D. is responsible for the message-passing "bus" for interprocess communication 

E. acts as a central repository for all process-related information 

F. performs health checks 

G. initiates disaster recovery based on the process health 

H. invokes a dumper to collect a core dump when a process terminates abnormally 

Answer: C,E,G,H