Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

Cisco 400-151 Exam Actual Questions

The questions for 400-151 were last updated on Nov. 10, 2024.
  • Viewing page 1 out of 49 pages.
  • Viewing questions 1-10 out of 489 questions

Topic 1 - Single Topic

Question #1 Topic 1

Which two statements about VXLAN are true? (Choose two.)

  • A. VXLAN uses a UDP destination port of 4987.
  • B. A VTEP is a virtual or physical device that maps end devices to VXLAN segments.
  • C. Devices that terminate VXLAN tunnels are known as VTEPs.
  • D. VXLAN adds an additional 32 bytes worth of headers.
Reveal Solution Hide Solution   Discussion  

Correct Answer: BC 🗳️

Question #2 Topic 1

Which two security features are supported by NX-API (Choose two.)

  • A. NX-API support certificate-based authentication.
  • B. Users must have appropriate accounts to access the device through NX-API.
  • C. All communication to the device is encrypted when you use HTTPS.
  • D. All communication to the device is encrypted when you use VPN.
Reveal Solution Hide Solution   Discussion  

Correct Answer: BC 🗳️

Question #3 Topic 1

Which three guidelines and limitations of policy-based routing are true? (Choose three.)

  • A. A match command can refer to more than one ACL in a route map for policy-based routing.
  • B. Setting a tunnel interface or an IP address via a tunnel interface as a next hop in a police-based routing policy is not supported.
  • C. The same route map can be shared among different interfaces for policy-based routing as long as interfaces belong to the same VRF instance.
  • D. An ACL used in a policy-based routing route map cannot include a deny statement.
  • E. A policy-based routing route map can have multiple match or set statements per route-map statement.
  • F. Policy-based routing and WCCPv2 are not supported on the same interface if bank chaining is disabled.
Reveal Solution Hide Solution   Discussion  

Correct Answer: BCD 🗳️
Policy-based routing has the following configuration guidelines and limitations: "¢ A policy-based routing route mapcan have only one match or set statement per route-map statement. "¢ A match command cannot refer to more than one ACL in a single route-map statement/clause. "¢ Policy-based routing is not supported with inbound traffic on FEX ports. "¢ An ACL used in a policy-based routing route map cannot include a deny statement. "¢ The same route map can be shared among different interfaces for policy-based routing as long as the interfaces belong to the same virtual routing and forwarding (VRF) instance. "¢ Setting atunnel interface or an IP address via a tunnel interface as a next hop in a policy-based routing policy is not supported.
References:

Question #4 Topic 1

Which statement about VTP bombing is true?

  • A. It occurs because of configuration mismatch on VTPv3 switches. This problem can be avoided using a confirmation management tool.
  • B. It occurs when switches with different VTP versions are connected together. This situation may occur when a new switch is plugged into a stable VTP domain. The MAC address table of the new switch overrides the MAC address table of stable switches causing interruption of service.
  • C. It occurs when a client connects to a switch and launches a distributed denial of service attack against the VTP domain. This attack is possible only ifthe client knows the VTP password.
  • D. It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier stable database is overwritten. D
Reveal Solution Hide Solution   Discussion   1

Correct Answer: Explanation 🗳️

Question #5 Topic 1

Which three options are common PTP device types? (Choose three.)

  • A. network clock
  • B. sundials
  • C. boundary clock
  • D. transparent clock
  • E. ordinary clock
  • F. crystal clock
Reveal Solution Hide Solution   Discussion  

Correct Answer: CDE 🗳️

Question #6 Topic 1

Which two options are functions of the 6LoWPAN header? (Choose two.)

  • A. packet fragmentation and reassembly
  • B. limit the lifespan of a packet (TTL)
  • C. IPv6 header compression
  • D. cyclic redundancy check
  • E. Layer 2 encryption
Reveal Solution Hide Solution   Discussion  

Correct Answer: AC 🗳️

Question #7 Topic 1

Which three options are benefits of the vPC peer switch feature? (Choose three.)

  • A. After the peer link comes up, it performs an ARP bulk sync over CFSoE to the peer switch
  • B. It improves convergence forLayer 3 flows.
  • C. It allows a pair of vPC peer devices to appear as a single STP root in the Layer 2.
  • D. It simplifies STP configuration by configuring both vPC with the same STP priority.
  • E. It eliminates the recommendation to pin the STP root to the vPCprimary switch. CDE
Reveal Solution Hide Solution   Discussion  

Correct Answer: Explanation 🗳️

Question #8 Topic 1

Which two statements about IP-directed broadcast are true? (Choose two.)

  • A. The destination address in the IP header of the packet is rewritten to the configured IP broadcast address for the subnet, and the packet is sent as a link-layer broadcast.
  • B. An IP-directed broadcast is an IP packet whose destination address is a valid broadcast address, and it originates from a node that is also part of the same subnet.
  • C. A switch that is not directly connectedto its destination subnet forwards an IP-directed broadcast in the same way it forwards unicast IP packets destined to a host on that subnet.
  • D. All switches in the network forward an IP-directed broadcast in the same way they forward multicast IP packets.
Reveal Solution Hide Solution   Discussion  

Correct Answer: AC 🗳️

Question #9 Topic 1

Which statement about glean throttling in Cisco NX-OS is true?

  • A. The traffic shaping feature in Cisco NX-OS to avoid bottle necks in the network.
  • B. Cisco NX-OS supports a rate-limiting feature to manage the access bandwidth policy for a network by ensuring that traffic falling within specified rate parameters is sent, while dropping packets that exceed the acceptable amount of traffic or sending them a different priority.
  • C. When forwarding an incoming IP packet in a line card, if the Address Resolution Protocol request for the next hop is not resolved, the line card forwards the packets to the supervisor. The supervisor resolves the MAC address for the next hop and programs the hardware.
  • D. The traffic policing feature manages the maximum rate of traffic through a token bucket algorithm. The token bucket algorithm can use the user-configured values to determine the maximum rate of traffic allowed on an interface at a given moment in time.
Reveal Solution Hide Solution   Discussion   1

Correct Answer: C 🗳️

Question #10 Topic 1

Which two guidelines apply to private VLAN configuration when you are running FabricPath (Choose two.)

  • A. On the F-Series modules, user-configured static MAC addresses are programmed on all forwarding engines that have ports in that VLAN.
  • B. The system does support hierarchical static MAC addresses.
  • C. FabricPath ports can be put into a private VLAN.
  • D. All VLANs in a private VLAN must be in the same VLAN mode; either CE or FabricPath.
Reveal Solution Hide Solution   Discussion  

Correct Answer: AD 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...