Preparing 400-201 exam with vaild 400-201 exam dumps, trying PassLeader’s 400-201 vce dumps or 400-201 pdf dumps, our 400-201 exam dumps coverd all the real exam questions, all new 400-201 exam questions are available in PassLeader’s 400-201 braindumps. Our 245q 400-201 premium vce file is the best study guide for preparing 400-201 exam, browsing PassLeader’s website and download 245q 400-201 exam questions.
keywords: 400-201 exam,245q 400-201 exam dumps,245q 400-201 exam questions,400-201 pdf dumps,400-201 practice test,400-201 vce dumps,400-201 study guide,400-201 braindumps,Cisco CCIE Service Provider Written Exam v4.0/v4.1
In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?
A. highest router ID first, then highest priority
B. highest MAC address first, then highest priority
C. highest router ID first, then highest MAC address
D. highest priority first, then highest router ID
E. highest priority first, then highest MAC address
Refer to the exhibit. If the SP network is configuring RTBH filtering to protect hosts on the 188.8.131.52/24 network, which router should be configured as the black hole activating router?
An engineer wants to configure Fast Reroute in the network. Which methodology eliminates RSVP configuration in the network?
A. Enable LDP Fast Synch.
B. Enable IP Fast Reroute.
C. Enable the autotunnel primary feature.
D. Enable Cisco MPLS TE Fast Reroute.
E. Enable the autotunnel backup feature.
The show ip ospf database external command displays information about which OSPF LSA type?
A. LSA type 1
B. LSA type 2
C. LSA type 7
D. LSA type 3
E. LSA type 9
F. LSA type 5
Which three statements about the secure domain router are true? (Choose three.)
A. The logical router can span across chassis.
B. The fabric and system controller module are shared by all logical routers.
C. Each logical router has a distinct fabric and system controller module
D. The logical router can share a route processor
E. The logical router cannot share a route processor.
An engineer is implementing an MPLS within the core of the Service Provider network. What two components are required to build the control and data plane for MPLS Label Switched Paths? (Choose two.)
Which three protocols use TLVs to carry attributes? (Choose three.)
A. Cisco Discovery Protocol
B. Label Discovery Protocol
C. Border Gateway Protocol
E. RIP version 2
Refer to the exhibit. An ISP engineer has been asked to identity a method to protect the PE and to control the number of BGP prefixes learned from his customers. The BGP session should be dropped if the PE router receives more than 1000 BGP prefixes. A syslog message should be generated when the number of BGP prefixes learned from CE exceeds 850.
Which Cisco IOS command should the engineer apply on PE routers?
A. neighbor 10.1.1.2 maximum-prefix 1000 85
B. neighbor 10.1.1.2 maximum-prefix 1000 850
C. neighbor 10.1.1.2 maximum-prefix 1000 85 warning-only
D. neighbor 10.1.1.2 maximum-prefix 1000 850 warning-only
Which methods would enable traffic to be forwarded along an MPLS TE tunnel (Choose 4.)
A. MP-BGP routing
B. Static routing
C. Policy routing
E. Forwarding adjacency
In the diagram, R1 is the head-end of a TE tunnel that terminates on R5. The red line indicates the protected link, and the gold line indicates the backup tunnel. Which router is the Point of Local Repair?
In which way does the DS-Lite IPv6 transitioning mechanism differ from IPv6 Dual-Stack?
A. DS-Lite is a combination of tunnel and translation technologies.
B. DS-Lite is a transition technology that gives full IPv6 connectivity for IPv6 capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network.
C. DS-Lite is an automatic tunnel where the tunnel destination is determined by the IPv4 address extracted from the IPv6 address that starts with the prefix 2002::/16.
D. DS-Lite is a stateless tunneling mechanism with a lightweight and secure manner without requiring upgrades to existing IPv4 access network infrastructure.
Refer to the exhibit. Customer XYZ Site 1 is not learning prefixes from Site 2. What is the issue?
A. MPLS LSP is broken along the path.
B. The route-policy is not implemented in router PE-2.
C. The BGP local-as command should be used between PE-1 and CE-1.
D. The route-distinguisher values must match in both sites.
E. The BGP as-override command should be implemented between between PE-1 and CE-1.
Which two models are the models of DiffServ-Aware Traffic Engineering? (Choose two)
A. Policy-based Model
B. Class based Model
C. Russian Doll Model
D. Global Tunnel Model
E. Maximum Allocation Model
What is one of the primary overhead fields associated with the Optical Payload Unit (OPU)?
A. path monitoring
B. tandem connection monitoring activation deactivation (TCM ACT)
C. Payload Structure Identifier (PSI)
D. multiframe alignment signal (MFAS)
E. section monitoring
Process-level redundancy is implemented by a system manager process that creates the standby process. What two functions are provided by the system-level process called Qnet Symlink Manager (QSM)? (Choose two.)
A. backing up the information for the broken connections
B. provides common information for connecting processes and services
C. detection of a failed connection
D. provides an abstract name for a process or service
E. distribution of symbolic link information
IP over DWDM management models (Choose two.)
A. Segmented Management
B. Integrated Management
C. Virtual Transponder
D. Traffic Management
A Service Provider wants to extend MPLS WAN endpoints in the cloud at the edge of a customer network within the cloud. Which platform will meet this requirement?
A. Cisco NX-OS
B. Cisco CSR1000v
C. Cisco ISR Routers running IOS
D. Cisco CRS-1
E. Cisco ASR Routers running IOS-XR
Which MPLS technology will achieve LAN extensions over the service provider backbone?
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are shared all SDRs? (Choose three.)
A. privilege-level configuration
B. fabric cards
C. SNMP traps
D. admin-level configuration
E. exec-level configuration
Refer to the exhibit. Which three statements describe r RIB-Failure in the show ip bgp command output? (Choose three.)
A. It is a redundancy route.
B. It is a route with a better administrative distance already present in IGP.
C. The number of routes in VRF exceeds the route limit that is configured under the VRF instance.
D. It is a rerouting entry.
E. It indicates memory failure.