Simulation 400-201 Dumps Questions 2021

Act now and download your 400 201 dumps today! Do not waste time for the worthless 400 201 dumps tutorials. Download 400 201 dumps with real questions and answers and begin to learn 400 201 dumps with a classic professional.

Free 400-201 Demo Online For Microsoft Certifitcation:

NEW QUESTION 1
In the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? (Choose two.)

  • A. port tunneling on the Ethernet subinterface
  • B. VLAN tunneling on the Ethernet trunk
  • C. port tunneling on the Ethernet interface
  • D. VLAN tunneling on the Ethernet VLAN subinterface
  • E. port tunneling on the Ethernet trunk

Answer: CD

Explanation: L2TPv3 can be configured on either a physical port or on a subinterface. The first is known as Port tunneling and the second as vlan tunneling.

NEW QUESTION 2
Select the three valid LMI extension:

  • A. Multicasting
  • B. Global addressing
  • C. Forward-explicit congestion notification (FECN)
  • D. Virtual circuit status messages.
  • E. Backward-explicit congestion notification (BECN)

Answer: ABD

Explanation: Optional LMI Extensions:
The LMI specification also defines several optional extensions:
* Global addressing convention
* Multicast capability
* A simple flow control mechanism
* Ability for the network to communicate a PVC's CIR to the subscriber in a Status message
* A new message type that allows the network to announce PVC status changes without prompting from the subscriber
Implementors may build any, all, or none of these features into their networks.

NEW QUESTION 3
How many messages does Internet Key Exchange use to negotiate SA characteristics when it runs in aggressive mode?

  • A. 3
  • B. 4
  • C. 5
  • D. 2
  • E. 6

Answer: A

NEW QUESTION 4
DRAG DROP
According to the Broadband TR-101 specification, drag and drop the connectivity models on the right onto the correct characteristic on the left
400-201 dumps exhibit

    Answer:

    Explanation: 400-201 dumps exhibit

    NEW QUESTION 5
    Which are the three characteristics of SDR? (Choose three)

    • A. The logical router can span across chassis.
    • B. Each logical router has a distinct fabric and system controller module.
    • C. Owner SDR can be reloaded, without affecting all non-SDRs.
    • D. The logical router has dedicated route processor.
    • E. The logical router can share line cards.
    • F. The fabric and system controller module are shared by all logical routers.

    Answer: ADF

    NEW QUESTION 6
    Refer to the exhibit.
    400-201 dumps exhibit
    An ISP network runs L3VPN MPLS over the IP core to deliver internet service for the customer as a central service through a dedicated VRF.
    Which route target plan delivers the internet service to customers while preserving customer VRF privacy?

    • A. vrf definition CUST-1 route-target export 100:2route-target import 100:2!vrf definition CUST-2 route-target export 100:1route-target import 100:1!vrf definition INTERNET route-target export 100:1route-target import 100:2
    • B. vrf definition CUST-1 route-target export 100:3route-target import 100:3!vrf definition CUST-2 route-target export 100:3route-target import 100:3!vrf definition INTERNET route-target export 100:1route-target import 100:2
    • C. vrf definition CUST-1 route-target export 100:3!vrf definition CUST-2 route-target export 100:3!vrf definition INTERNET route-target import 100:1route-target import 100:2
    • D. vrf definition CUST-1 route-target import 100:3!vrf definition CUST-2 route-target import 100:3!vrf definition INTERNET route-target import 100:1route-target import 100:2

    Answer: D

    NEW QUESTION 7
    Assume two routers on the same subnet, R1 and R2, both configured for HSRP. R1 has a priority of 120. Which of the following HSRP interface configurations will always result in the R2 becoming the primary? (Choose two.)

    • A. standby 1 priority 120
    • B. standby 1 priority 130 preempt
    • C. standby 1 priority 130
    • D. standby 1 priority 120 preempt
    • E. standby 1 priority 110 preempt
    • F. standby 1 priority 110

    Answer: BC

    NEW QUESTION 8
    Which two components are shared across secure domain routers? (Choose two)

    • A. Fabric
    • B. CPU
    • C. Memory
    • D. Fans
    • E. Forwarding engine

    Answer: AD

    NEW QUESTION 9
    A security agency wants to use the services of the service provider to interconnect the remote sites. However, they do not want to share the IP addresses of their sites and they want end-to-end security.
    Which three services meet the design requirements? (Choose three.)

    • A. client mode VPN
    • B. tunnel mode VPN
    • C. L2VPN
    • D. L3VPN
    • E. PPTP
    • F. SSL VPN

    Answer: ABC

    NEW QUESTION 10
    Refer to the exhibit.
    400-201 dumps exhibit
    Router A is configured with a BGP keepalive timer of 20 seconds and a BGP holddown timer interval of 60 seconds. The BGP peer router B is configured with 5 seconds of keepalive interval and 15 seconds of holddown timer interval.
    Which option is the value of the keepalive interval and holddown timers, respectively, after the successful BGP TCP negotiation between router A and router B?

    • A. BGP TCP negotiation will not be successful.
    • B. 20 and 60 seconds
    • C. 5 and 15 seconds
    • D. Router A will use 20 and 60 seconds and router B will use 5 and 15 seconds.
    • E. Router B will use 20 and 60 seconds and router A will use 5 and 15 seconds.

    Answer: C

    NEW QUESTION 11
    Which statement about L2VPN Pseudowire Switching is not true?

    • A. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across an inter- AS boundary
    • B. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across two separate MPLS networks.
    • C. Quality of service is not supported per Pseudowire
    • D. L2VPN Pseudowire Switching connects two or more contiguous Pseudowires segments to from an end-toendmultihop Pseudowire
    • E. The Cisco MPLS Traffic Engineering tunnel selection is not supported

    Answer: E

    Explanation: ReferencE.
    http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fsstitch.html#wp1053770

    NEW QUESTION 12
    400-201 dumps exhibit
    Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet. Assume that IP address overlapping between VRFs is not an issue.
    Which three configuration steps are required to add Internet service to the VRF customers? (Choose three.)

    • A. Export the RD of vrf INTERNET from all customer VRFs.
    • B. Originate a default route on PE4 in vrf INTERNET.
    • C. Import the RD from vrf INTERNET in all customer VRFs.
    • D. Originate a default route on the firewall in vrf INTERNET.
    • E. Import the VRF “INTERNET” Route Target in all customer VRFs.
    • F. Import the Route Target of all customer VRFs in vrf INTERNET.
    • G. Leak all VRF routes to the global routing table.

    Answer: BEF

    NEW QUESTION 13
    DRAG DROP
    400-201 dumps exhibit

      Answer:

      Explanation: 400-201 dumps exhibit

      NEW QUESTION 14
      In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the Default MDT Group? (Choose two).

      • A. It is used for PIM control traffic.
      • B. It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers.
      • C. Within the VRF configuration in the PE router, multiple Default MDT groups are configured so each VRF can support multiple multicast sources.
      • D. There is a reduced multicast state in the MPLS core P routers.
      • E. When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth.

      Answer: AD

      Explanation: MVPN supports two MDT types:
      •Default MDT—The default MDT is a permanent channel for PIM control messages and low-bandwidth streams between all PE routers in a particular multicast domain. All multicast traffic in the default MDT is replicated to every other PE router in the domain. Each PE router is logically seen as a PIM neighbor (one hop away) from every other PE router in the domain.
      •Data MDT—Data MDTs are optional. If enabled, they are dynamically created to provide optimal paths for high-bandwidth transmissions, such as full-motion video, that do not need to be sent to every PE router. This allows for on-demand forwarding of high-bandwidth traffic between PE routers, so as to avoid flooding every PE router with every high- bandwidth stream that might be created.

      NEW QUESTION 15
      Refer to the exhibit.
      400-201 dumps exhibit
      Inbound Infrastructure ACLs are configured to protect the SP network. Which three types of traffic should be filtered in the infrastructure ACLs? (Choose three.)

      • A. traffic from a source with an IP address that is within 239.255.0.0/16
      • B. FTP traffic destined for internal routers
      • C. IPsec traffic that at an internal router
      • D. traffic from a source with an IP address that is within 162.238.0.0/16
      • E. EBGP traffic that peers with edge routers

      Answer: ABD

      Explanation: With the use of the protocols and addresses identified, the infrastructure ACL can be built to permit the protocols and protect the addresses. In addition to direct protection, the ACL also provides a first line of defense against certain types of invalid traffic on the Internet:
      - RFC 1918 space must be denied. (RFC1918 describes a set of network ranges set aside for so-called "private" use.)
      - Packets with a source address that fall under special-use address space, as defined in RFC 3330, must be denied.
      - Anti-spoof filters must be applied. (Your address space must never be the source of packets from outside your AS.)

      NEW QUESTION 16
      In the case of 6RD, how does the residential gateway device route the IPv6 packet received from local host?

      • A. It looks into the local NAT table to translate the IPv6 address into an IPv4 address.
      • B. It looks for the IPv6 destination in the local IPv6 routing table.
      • C. It sends all the IPv6 traffic to the Border Relay router.
      • D. It derives the IPv4 address from the IPv6 destination address.

      Answer: D

      Recommend!! Get the Full 400-201 dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/400-201-exam-dumps.html (New 699 Q&As Version)