web analytics

[23-Oct-2018] New 400-201 Dumps with VCE and PDF from PassLeader (Update Questions)

New 400-201 exam questions from PassLeader 400-201 dumps! Welcome to download the newest PassLeader 400-201 VCE and PDF dumps: http://www.passleader.com/400-201.html (835 Q&As –> 951 Q&As)

P.S. Free 400-201 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpVkYtTGdtRWFodXM

NEW QUESTION 808
Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that are supported by the IETF? (Choose two.)

A.    VPLS uses LDP for signaling.
B.    VPLS uses BGP for autodiscovery and signaling.
C.    VPLS uses extended IS-IS for signaling.
D.    VPLS uses OSPF version 3 for auto discovery and signaling.
E.    VPLS uses spanning tree for signaling.

Answer: AB

NEW QUESTION 809
Which three things are the building blocks of the Cisco VPLS architecture? (Choose three.)

A.    VLAN Trunk Protocol (VTP)
B.    State Synchronization Protocol (SSP)
C.    L2VPN
D.    Ethernet Virtual Switch Interface (VSI)
E.    Label Distribution Protocol (LDP)

Answer: CDE

NEW QUESTION 810
What is the data encapsulation method for the VPLS virtual circuit (VC)?

A.    MAC over MPLS
B.    L2TPV3
C.    802.1 QinQ
D.    Ethernet over MPLS
E.    GRE

Answer: D

NEW QUESTION 811
With VPLS, which protocol is used for label exchange and PW signalling?

A.    MP-BGP
B.    LDP
C.    BGP
D.    MTP
E.    Directed LDP
F.    IGP

Answer: E

NEW QUESTION 812
Which two statements are correct? (Choose two.)

A.    A VC type 5 transports a VLAN over MPLS.
B.    A VC type 4 tunnels an Ethernet port over MPLS.
C.    A VC type 5 tunnels an Ethernet port over MPLS.
D.    A VC type 4 transports a VLAN over MPLS.

Answer: CD

NEW QUESTION 813
Which statement about VPLS is true?

A.    All CE devices emulate a bridge.
B.    All provider devices emulate a bridge.
C.    Hierarchical VPLS reduces signaling overhead.
D.    Each PE device emulates a bridge.
E.    Each CE device emulates a bridge.

Answer: C

NEW QUESTION 814
Which two statements about VPLS are true? (Choose two.)

A.    There is a full mesh of pseudo wires.
B.    There is a partial mesh of pseudo wires.
C.    Only L2TPv3 can be used for pseudo wire establishment.
D.    There is split-horizon to avoid loops.

Answer: AD

NEW QUESTION 815
According to RFC 3931, L2TPv3 utilizes the IANA assigned IP protocol ID of which?

A.    110
B.    101
C.    121
D.    51
E.    151
F.    115

Answer: F

NEW QUESTION 816
In AToM, control word is an optional 4-byte field used in the pseudowire packet. The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly. In pseudowire packet, where is this control word inserted?

A.    Inserted between the MPLS label stack and the Layer 3 payload.
B.    Inserted between the MPLS label stack and the Layer 3 header.
C.    Inserted between the MPLS label stack and the Layer 2 payload.
D.    Inserted between the MPLS label stack and the Layer 2 header.

Answer: D

NEW QUESTION 817
In the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? (Choose two.)

A.    port tunneling on the Ethernet subinterface
B.    VLAN tunneling on the Ethernet trunk
C.    port tunneling on the Ethernet interface
D.    VLAN tunneling on the Ethernet VLAN subinterface
E.    port tunneling on the Ethernet trunk

Answer: CD

NEW QUESTION 818
Packed Cell Relay encapsulation with AToM includes which of the following? (Choose four.)

A.    Tunnel label
B.    VC-label
C.    5-byte ATM header
D.    Payload
E.    4 byte ATM header
F.    Support for 30 packed cells.

Answer: ABDE

NEW QUESTION 819
Which three configuration options are available for configuring the l2tp-class command in L2TPv3? (Choose three.)

A.    TCP port
B.    authentication
C.    IP DF bit
D.    retransmit retries
E.    sequencing
F.    hostname

Answer: BDF

NEW QUESTION 820
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?

A.    hub and spoke
B.    PE
C.    CE
D.    hub
E.    spoke

Answer: D

NEW QUESTION 821
When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered? (Choose three.)

A.    Layer 2 access link QoS design
B.    enterprise-to-service-provider mapping models
C.    Layer 3 link access QoS design
D.    service provider service level agreements
E.    Layer 2 link access load balancing

Answer: ABD

NEW QUESTION 822
Which two Any Transport over MPLS (AToM) traffic encapsulations require the use of a control word? (Choose two.)

A.    HDLC
B.    ATM AAL5
C.    PPP
D.    Ethernet VLAN
E.    Frame Relay

Answer: BE

NEW QUESTION 823
Which two features must be configured to perform AToM NSF? (Choose two.)

A.    FRR
B.    SSO
C.    distribute CEF
D.    switch virtual path
E.    graceful restart

Answer: BE

NEW QUESTION 824
Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? (Choose three.)

A.    PW capabilities list
B.    Message type
C.    Assigned control connection ID
D.    PW type
E.    Remote session ID
F.    Hostname

Answer: BDE

NEW QUESTION 825
Which two statements about NTP version 4 are true? (Choose two.)

A.    It supports fast synchronization at starting and before network failures.
B.    It supports automatic server discovery.
C.    It uses a fixed-point arithmetic.
D.    It supports the “nanokernel” kernel implementation.
E.    It does not support Public-Key Cryptography.

Answer: BD

NEW QUESTION 826
What is the port number of the IPsec Authentication Header packet?

A.    IP protocol 50
B.    TCP port 51
C.    UDP port 50
D.    IP protocol 51
E.    UDP port 51
F.    TCP port 50

Answer: D

NEW QUESTION 827
What is the port number of the IPsec Encapsulating Security Payload packet?

A.    UDP port 50
B.    IP protocol 51
C.    TCP port 51
D.    TCP port 50
E.    IP protocol 50
F.    UDP port51

Answer: E

NEW QUESTION 828
How many messages does Internet Key Exchange (IKE) use to negotiate SA characteristics when running in aggressive mode?

A.    3 messages
B.    4 messages
C.    5 messages
D.    2 messages
E.    6 messages

Answer: A

NEW QUESTION 829
How many messages does Internet Key Exchange (IKE) use to negotiate SA characteristics when running in main mode?

A.    3 messages
B.    6 messages
C.    4 messages
D.    2 messages
E.    5 messages

Answer: B

NEW QUESTION 830
Which four statements about an IP service level agreement (SLA) are true? (Choose four.)

A.    SLA responder knows type of operation, the port used, and duration.
B.    SLA responder inserts in and out timestamps in the packet payload.
C.    SLA sender and responder use the IP SLA Control Protocol to communicate with each other before sending test packets.
D.    SLA sender and responder communication can be encrypted.
E.    SLA sender and responder communication can be authenticated with MD5.

Answer: ABCE

NEW QUESTION 831
Which three of these statements about the IP service level agreement (SLA) sender are true? (Choose three.)

A.    SLA sender target can be an IP host.
B.    SLA sender sends a probe packet and a response probe packet.
C.    SLA sender sends a probe packet.
D.    SLA sender target must be a router.
E.    SLA sender target can be an IP SLA responder.

Answer: ACE

NEW QUESTION 832
……


New 400-201 exam questions from PassLeader 400-201 dumps! Welcome to download the newest PassLeader 400-201 VCE and PDF dumps: http://www.passleader.com/400-201.html (835 Q&As –> 951 Q&As)

P.S. Free 400-201 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpVkYtTGdtRWFodXM