Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following statements about multi-homing in EVPN is FALSE?

A.

Type 1 Ethernet Auto-Discovery (A-D) EVPN route is used to support EVPN multi-homing.

B.

Type 4 Ethernet Segment (ES) EVPN route is used for designated forwarder (DF) election for an ES.

C.

The ES identifier (ESI) uniquely identifies an ES and it is locally significant for a particular leaf.

D.

The Ethernet Segment (ES) identifies a set of links that connects a host to one or more leafs.

Full Access
Question # 5

Which of the following statements about resilient ECMP load balancing is TRUE?

A.

The hash value used to distribute traffic is calculated as a modulo function on specific fields of the packet header.

B.

Hash buckets are used to ensure that flows egressing the same interface on one router use different egress interfaces on downstream routers.

C.

A different hash seed is used on downstream routers to ensure that flows are randomly distributed across all eligible router interfaces.

D.

When one of the next-hops fail, only flows currently egressing to that next-hop are impacted.

Full Access
Question # 6

When autoboot flag is set in grub.cfg, which of the following is NOT performed as part of the Zero Touch Provisioning (ZTP) autoboot process?

A.

Uses the DHCP server to provide the IP address and default gateway

B.

Uses the Web or FTP server to provide the RPM packages and any necessary images

C.

Downloads and executes provisioning scripts

D.

Uses Nokia’s Fabric Services System to deploy the digital sandbox automatically

Full Access
Question # 7

Which of the following statements about a CPM-filter policer is FALSE?

A.

Hierarchical policing of control plane traffic is supported.

B.

The system-cpu-policer is hardware-based.

C.

The system-cpu-policer acts on the aggregate traffic from all line cards.

D.

CPM-filter entries can use both a distributed-policer and a system-cpu-policer.

Full Access
Question # 8

Which of the following statements about the YANG model used in Nokia’s SR Linux is FALSE?

A.

All configuration and state information is defined as a YANG model.

B.

The YANG model uses a tree structure with “leafs” as the branches and “containers” as the data components.

C.

The YANG model can be converted into other formats such as JSON or XML.

D.

The YANG model provides a standardized way for applications to retrieve SR Linux configuration and state information.

Full Access
Question # 9

Based on the exhibit output, what CLI command can be used to display the contents of "bgp-log" in Nokia’s SR Linux?

A.

show system logging buffer bgp-log

B.

show system logging file bgp-log

C.

info system logging buffer bgp-log

D.

info system logging file bgp-log

Full Access
Question # 10

How are LLDP frames advertised between two Nokia SR Linux routers?

A.

They are forwarded to the destination node based on the MAC VRF table.

B.

They are forwarded to the destination node based on the MAC VRF table. (Duplicate of A)

C.

They are periodically flooded to the broadcast MAC address on each interface.

D.

They are routed to the destination node based on the IP VRF forwarding table.

Full Access