Deck 16: New Data Center, Professional
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 16: New Data Center, Professional
1
A company wants to expand their hosting business and is seeking solutions to support multiple tenants. Each tenant should be able to configure their own logical interfaces. Also, based on customer needs, all routing features must be supported. What will satisfy the customer's requirements?
A) routing instances
B) tenant systems
C) logical systems
D) bridge domains
A) routing instances
B) tenant systems
C) logical systems
D) bridge domains
routing instances
2
You host a multitenant data center that runs VMware. You must perform deep packet inspection on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device. In this scenario, what should you do to solve this problem?
A) Use separate vSwitches to isolate each tenant's networks and use IP tables to evaluate inter-tenant traffic.
B) Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.
C) Use a vMX device to isolate each tenant's networks and use with firewall filters to evaluate inter-tenant traffic.
D) Use separate vSwitches to isolate each tenant's networks and use a vSRX Series device to evaluate inter-tenant traffic.
A) Use separate vSwitches to isolate each tenant's networks and use IP tables to evaluate inter-tenant traffic.
B) Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.
C) Use a vMX device to isolate each tenant's networks and use with firewall filters to evaluate inter-tenant traffic.
D) Use separate vSwitches to isolate each tenant's networks and use a vSRX Series device to evaluate inter-tenant traffic.
Use separate vSwitches to isolate each tenant's networks and use a vSRX Series device to evaluate inter-tenant traffic.
3
A VXLAN adds 50 to 54 bytes of extra header information to an Ethernet frame. In this scenario, how would you accommodate this increase?
A) Decrease the number VXLANs used.
B) Increase the MTU on the physical interface connected to the VXLAN network.
C) Only use switches as VTEPs.
D) Increase the MTU on the VTEP interface connected to the VXLAN network.
A) Decrease the number VXLANs used.
B) Increase the MTU on the physical interface connected to the VXLAN network.
C) Only use switches as VTEPs.
D) Increase the MTU on the VTEP interface connected to the VXLAN network.
Increase the MTU on the physical interface connected to the VXLAN network.
4
Host1 and host2 are connected to an EVPN signaled VXLAN overlay, and must have Layer 3 connectivity. The VNI and VLAN assignments are shown in the exhibit.
In this scenario, which two statements are true? (Choose two.)
A) The ESI assigned to the host1 link will be different from the ESI assigned to the host2 link.
B) The VNI assigned to the host1 link must be the same as the VNI assigned to the host2 link.
C) A Layer 3 gateway can be configured on the spine devices.
D) A Layer 3 gateway can be configured on the leaf devices.

A) The ESI assigned to the host1 link will be different from the ESI assigned to the host2 link.
B) The VNI assigned to the host1 link must be the same as the VNI assigned to the host2 link.
C) A Layer 3 gateway can be configured on the spine devices.
D) A Layer 3 gateway can be configured on the leaf devices.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
Referring to the VTEP output shown in the exhibit, which two statements are true? (Choose two.) 
A) The MAC address 52:54:00:2c:4b:a2 belongs to a local host.
B) The MAC address 52:54:00:5e:88:6a belongs to a remote host.
C) The MAC address 52:54:00:2c:4b:a2 belongs to a remote host.
D) The MAC address.52:54:00:5e:88:6a belongs to a local host.

A) The MAC address 52:54:00:2c:4b:a2 belongs to a local host.
B) The MAC address 52:54:00:5e:88:6a belongs to a remote host.
C) The MAC address 52:54:00:2c:4b:a2 belongs to a remote host.
D) The MAC address.52:54:00:5e:88:6a belongs to a local host.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
What are three advantages of using MPLS for data center interconnects? (Choose three.)
A) dedicated MPLS backbones for Layer 2 and Layer 3 DCIs
B) any-to-any connectivity
C) traffic engineering
D) dedicated connections between customer sites
E) sub 50 ms failover times
A) dedicated MPLS backbones for Layer 2 and Layer 3 DCIs
B) any-to-any connectivity
C) traffic engineering
D) dedicated connections between customer sites
E) sub 50 ms failover times
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
When using EBGP as the underlay protocol for your IP fabric architecture, which two statements are true? (Choose two.)
A) Spine nodes only peer to leaf nodes.
B) Leaf nodes peer to both spine and leaf nodes.
C) Leaf nodes only peer to spine nodes.
D) Spine nodes peer to both leaf and spine nodes.
A) Spine nodes only peer to leaf nodes.
B) Leaf nodes peer to both spine and leaf nodes.
C) Leaf nodes only peer to spine nodes.
D) Spine nodes peer to both leaf and spine nodes.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
You are designing an EBGP IP fabric for a multi-site data center. In this scenario, which two statements are true? (Choose two.)
A) Public AS numbers must be used.
B) Different AS numbers should be used on all devices.
C) The same AS number should be used on all devices across all data centers.
D) Private AS numbers can be used.
A) Public AS numbers must be used.
B) Different AS numbers should be used on all devices.
C) The same AS number should be used on all devices across all data centers.
D) Private AS numbers can be used.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
You are asked to manage the oversubscription ratio of your spine and leaf IP fabric. You determine that you are at a 3:1 ratio of downstream to upstream traffic and must achieve a 1:1 ratio. In this scenario, which two actions would you take to achieve this goal? (Choose two.)
A) Increase the number of server-facing ports that each leaf node uses to carry traffic.
B) Reduce the number of server-facing ports that each leaf node uses to carry traffic.
C) Increase the number of spine nodes in your design.
D) Reduce the number of leaf nodes in your design.
A) Increase the number of server-facing ports that each leaf node uses to carry traffic.
B) Reduce the number of server-facing ports that each leaf node uses to carry traffic.
C) Increase the number of spine nodes in your design.
D) Reduce the number of leaf nodes in your design.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
You are designing a network for a small data center. In this scenario, which underlay protocol allows for the simplest implementation?
A) OSPF
B) IBGP
C) EBGP
D) MPLS
A) OSPF
B) IBGP
C) EBGP
D) MPLS
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
Referring to the exhibit, Host 1 and Host 3 have exchanged traffic.
` In this scenario, which statement is true?
A) Leaf 2 does not learn Host 1's MAC address until Host 1 and Host 2 send traffic to each other.
B) Leaf 2 learns Host 1's MAC address through periodic updates from Spine 2.
C) Leaf 2 learns Host 1's MAC address when Host 3 learns Host 1's MAC address.
D) Leaf 2 learns Host 1's MAC address when Leaf 1 queries Host 1.

A) Leaf 2 does not learn Host 1's MAC address until Host 1 and Host 2 send traffic to each other.
B) Leaf 2 learns Host 1's MAC address through periodic updates from Spine 2.
C) Leaf 2 learns Host 1's MAC address when Host 3 learns Host 1's MAC address.
D) Leaf 2 learns Host 1's MAC address when Leaf 1 queries Host 1.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
You want to configure redundant Layer 3 gateways. In this scenario, which two Juniper best practices would accomplish this task? (Choose two.)
A) configuring both IRB interfaces manually with the same MAC address.
B) allowing Junos to dynamically create the virtual IP address of the IRB interface.
C) configuring both IRB interfaces manually with the same IP address.
D) allowing Junos to dynamically create the virtual MAC address of the IRB interface.
A) configuring both IRB interfaces manually with the same MAC address.
B) allowing Junos to dynamically create the virtual IP address of the IRB interface.
C) configuring both IRB interfaces manually with the same IP address.
D) allowing Junos to dynamically create the virtual MAC address of the IRB interface.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
You are asked to deploy 20 QFX Series devices using ZTP. Each QFX5100 requires a specific FTP server. In this scenario, which two components must you configure on the DHCP server? (Choose two.)
A) the IP address of the FTP server
B) the MAC address of the FTP server
C) the IP address of each QFX5100
D) the MAC address of each QFX5100
A) the IP address of the FTP server
B) the MAC address of the FTP server
C) the IP address of each QFX5100
D) the MAC address of each QFX5100
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
You are implementing perimeter security for your data center. You need to inspect all traffic at Layer 7 and ensure the failure of a port or device will not result in an interruption to traffic flows. In this scenario, which design would satisfy these requirements?
A) SRX using LAG
B) MX with MC-LAG
C) QFX Virtual Chassis
D) SRX chassis cluster
A) SRX using LAG
B) MX with MC-LAG
C) QFX Virtual Chassis
D) SRX chassis cluster
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which statement is true about a Data Center Interconnect over an IP network?
A) Layer 2 data must traverse a point-to-point link.
B) Layer 2 data must traverse an MPLS LSP.
C) Layer 2 data must be encapsulated.
D) Layer 3 data must be encapsulated.
A) Layer 2 data must traverse a point-to-point link.
B) Layer 2 data must traverse an MPLS LSP.
C) Layer 2 data must be encapsulated.
D) Layer 3 data must be encapsulated.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
You are configuring VXLAN, and you must ensure that all switches for the multicast groups advertise their existence and learn about other VTEPs. In this scenario, which protocol will accomplish this task?
A) OSPF
B) BGP
C) EVPN
D) PIM
A) OSPF
B) BGP
C) EVPN
D) PIM
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
After configuring an IP fabric using EBGP as your routing protocol, you notice that not all of the routes are showing up in the routing tables. You have verified that all adjacencies have formed, and that all policies are in place and configured properly. In this scenario, which statement is true?
A) The routers have not been configured with the multipath multiple-as parameter. The routers have not been configured with the multipath multiple-as parameter.
B) The routers have not been configured using the add-path parameter. The routers have not been configured using the add-path
C) The routers have not been configured using the bfd-liveness-detection parameter. bfd-liveness-detection
D) The routers have not been configured using the multihop parameter. multihop
A) The routers have not been configured with the multipath multiple-as parameter. The routers have not been configured with the multipath multiple-as parameter.
B) The routers have not been configured using the add-path parameter. The routers have not been configured using the add-path
C) The routers have not been configured using the bfd-liveness-detection parameter. bfd-liveness-detection
D) The routers have not been configured using the multihop parameter. multihop
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
You need to add perimeter security to the network shown in the exhibit. All traffic must be inspected for attacks. The edge routers are using all available ports. Your solution must maintain both port and device resiliency.
In this scenario, which design would satisfy these requirements?
A) one-arm SRX Series device using LAG
B) one-arm SRX Series chassis cluster
C) inline SRX Series chassis cluster
D) inline SPX Series device using LAG

A) one-arm SRX Series device using LAG
B) one-arm SRX Series chassis cluster
C) inline SRX Series chassis cluster
D) inline SPX Series device using LAG
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
You are configuring an IP Fabric in your data center and you are trying to load-balance traffic across multiple equal-cost BGP routes. You have enabled multipath, but the traffic is not being load-balanced.
Referring to the exhibit, what will solve this problem?
A) You should apply the load-balance policy as an import policy to the forwarding table. You should apply the load-balance policy as an import policy to the forwarding table.
B) You should apply the load-balance policy as an import policy for the BGP neighbor. policy as an import policy for the BGP neighbor.
C) You should apply the load-balance policy as an export policy to the forwarding table. policy as an export policy to the forwarding table.
D) You should apply the load-balance policy as an export policy to the BGP neighbor. policy as an export policy to the BGP neighbor.

A) You should apply the load-balance policy as an import policy to the forwarding table. You should apply the load-balance policy as an import policy to the forwarding table.
B) You should apply the load-balance policy as an import policy for the BGP neighbor. policy as an import policy for the BGP neighbor.
C) You should apply the load-balance policy as an export policy to the forwarding table. policy as an export policy to the forwarding table.
D) You should apply the load-balance policy as an export policy to the BGP neighbor. policy as an export policy to the BGP neighbor.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Referring to the exhibit, not all routes are being exchanged by EBGP peers.
In this scenario, which BGP parameter would solve this problem?
A) multihop
B) multipath
C) multipath multiple-as
D) as-override

A) multihop
B) multipath
C) multipath multiple-as
D) as-override
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
What is the purpose of the command shown in the exhibit? 
A) to stop the transmission of transit multicast traffic when there are no interested receivers attached to a remote VTEP.
B) to disallow IGMP requests for the group 239.0.0.1 from hosts attached to the local VTEP.
C) to disable the multicast group 239.0.0.1 across the entire VXLAN.
D) to stop the reception of transit multicast traffic when there are no interested receivers attached to the local VTEP.

A) to stop the transmission of transit multicast traffic when there are no interested receivers attached to a remote VTEP.
B) to disallow IGMP requests for the group 239.0.0.1 from hosts attached to the local VTEP.
C) to disable the multicast group 239.0.0.1 across the entire VXLAN.
D) to stop the reception of transit multicast traffic when there are no interested receivers attached to the local VTEP.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
In the exhibit, VM1 is part of the same VXLAN segment as VM3.
Which type of message will VTEP B initially send to the RP so that VM3 can communicate with VM1?
A) PIM join
B) PIM register message
C) IGMP Join (S,G)
D) IGMP Join (*,G)

A) PIM join
B) PIM register message
C) IGMP Join (S,G)
D) IGMP Join (*,G)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Which two statements describe EVPN-based VXLAN implementations? (Choose two.)
A) The movement of a virtual host requires a manual reconfiguration of the VTEP.
B) The movement of a virtual host results in the dynamic remapping of the VTEP.
C) MAC addresses are learned using multicast flooding.
D) MAC addresses are propagated using BGP updates.
A) The movement of a virtual host requires a manual reconfiguration of the VTEP.
B) The movement of a virtual host results in the dynamic remapping of the VTEP.
C) MAC addresses are learned using multicast flooding.
D) MAC addresses are propagated using BGP updates.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
You are asked to configure VXLAN for your data center using multicast to exchange VTEP information. In this scenario, which two configuration parameters must match on the VTEPs in the same VXLAN segment? (Choose two.)
A) multicast group
B) VLAN ID
C) routing instance name
D) VNI
A) multicast group
B) VLAN ID
C) routing instance name
D) VNI
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
Which two statements define the use of route targets and route distinguishers in an EVPN? (Choose two.)
A) Route targets ensure that routes from different clients remain unique within the data center domain.
B) Route targets identify the VRF into which the route should be placed.
C) Route distinguishers ensure that routes from different clients remain unique within the data center domain.
D) Route distinguishers identify the VRF into which the route should be placed.
A) Route targets ensure that routes from different clients remain unique within the data center domain.
B) Route targets identify the VRF into which the route should be placed.
C) Route distinguishers ensure that routes from different clients remain unique within the data center domain.
D) Route distinguishers identify the VRF into which the route should be placed.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
Referring to the exhibit, each node in the IP fabric is peering to its directly attached neighbor using EBGP. Each node is peering using physical interface IP addresses. Leaf 2 and Leaf 3 are advertising the 10.1.1/24 network into EBGP. Spine 2 must be configured so that it can load-share traffic destined to the 10 1.1/24 network over both next-hop A and next-hop B.
Which two actions must be performed to accomplish this task? (Choose two.)
A) Use a load-balancing policy applied to the forwarding table.
B) Use multipath multiple-AS.
C) Use advertise-inactive.
D) Use multihop.

A) Use a load-balancing policy applied to the forwarding table.
B) Use multipath multiple-AS.
C) Use advertise-inactive.
D) Use multihop.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
Which protocol replicates forwarding information between MC-LAG peers?
A) VCCP
B) ICCP
C) VRRP
D) LLDP
A) VCCP
B) ICCP
C) VRRP
D) LLDP
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
You are creating a new EVPN and are asked to selectively accept certain MAC advertisement routes from your EVPN peers using VXLAN encapsulation. Which statement is correct in this scenario?
A) You can use MAC filtering to filter out unwanted routes.
B) You can use VRF import policies and route distinguisher values to filter out unwanted routes.
C) You can use VRF import policies and community values to filter out unwanted routes.
D) You can use firewall filters to filter out unwanted routes.
A) You can use MAC filtering to filter out unwanted routes.
B) You can use VRF import policies and route distinguisher values to filter out unwanted routes.
C) You can use VRF import policies and community values to filter out unwanted routes.
D) You can use firewall filters to filter out unwanted routes.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
You have configured a new MC-LAG connection to a host. After committing the configuration, the MC-LAG link is not functioning properly.
Referring to the exhibit, how would you solve this problem?
A) Change the chassis-id on qfx1 to 1. Change the chassis-id on qfx1 to 1.
B) Configure a system-id on qfx1 that is different from the system-id on qfx2. Configure a system-id on qfx1 that is different from the on qfx2.
C) Configure the status-control on qfx2 to active. Configure the status-control on qfx2 to active.
D) Change the mc-ae-id on qfx1 to 1. mc-ae-id

A) Change the chassis-id on qfx1 to 1. Change the chassis-id on qfx1 to 1.
B) Configure a system-id on qfx1 that is different from the system-id on qfx2. Configure a system-id on qfx1 that is different from the on qfx2.
C) Configure the status-control on qfx2 to active. Configure the status-control on qfx2 to active.
D) Change the mc-ae-id on qfx1 to 1. mc-ae-id
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
You have deployed two data centers that require a Layer 2 stretch between host1 and host2.
Referring to the exhibit, what does a Layer 2 stretch require?
A) a VXLAN tunnel originating on the Super Spine Layer in DC1 to the Super Spine Layer in DC2.
B) a VXLAN tunnel originating on VTEP1 to VTEP2.
C) a VXLAN tunnel originating on the Spine Layer in DC1 to the Spine Layer in DC2.
D) a VPLS WAN connection between data centers.

A) a VXLAN tunnel originating on the Super Spine Layer in DC1 to the Super Spine Layer in DC2.
B) a VXLAN tunnel originating on VTEP1 to VTEP2.
C) a VXLAN tunnel originating on the Spine Layer in DC1 to the Spine Layer in DC2.
D) a VPLS WAN connection between data centers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
Devices spine1 and spine2 have been configured as distributed Layer 3 gateways in the VXLAN topology, and devices leaf1 and leaf3 have been configured as Layer 2 gateways. Device host1 must be able to communicate with device host2.
Referring to the exhibit, which two statements are true? (Choose two.)
A) An IRB interface must be configured on devices leaf1 and leaf2.
B) Traffic from host1 to host2 will transit the VXLAN tunnel from leaf1 to leaf3.
C) Traffic from host1 to host2 will transit a VXLAN tunnel to spine1 or spine2, then a VXLAN tunnel from spine1 or spine2 to leaf3.
D) An IRS interface must be configured on devices spine1 and spine2.

A) An IRB interface must be configured on devices leaf1 and leaf2.
B) Traffic from host1 to host2 will transit the VXLAN tunnel from leaf1 to leaf3.
C) Traffic from host1 to host2 will transit a VXLAN tunnel to spine1 or spine2, then a VXLAN tunnel from spine1 or spine2 to leaf3.
D) An IRS interface must be configured on devices spine1 and spine2.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
You have a site with thousands of MAC addresses multihomed to two leaf nodes in an EVPN VXLAN. In this scenario, which EVPN feature provides fast network convergence in the event of a leaf node link failure?
A) BGP Additional Paths
B) Bidirectional Forwarding Detection
C) Ethernet Autodiscovery
D) Fast reroute
A) BGP Additional Paths
B) Bidirectional Forwarding Detection
C) Ethernet Autodiscovery
D) Fast reroute
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Which EVPN route type prevents BUM traffic from looping back to a multihomed host?
A) IP prefix route
B) Ethernet autodiscovery route
C) Ethernet segment route
D) inclusive multicast-Ethernet tag route
A) IP prefix route
B) Ethernet autodiscovery route
C) Ethernet segment route
D) inclusive multicast-Ethernet tag route
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
You have deployed a VXLAN as shown in the exhibit Leaf1, leaf3, spine1, and spine2 have been configured as VTEPs. Host1 cannot communicate with host2.
Referring to the exhibit, how would you solve this problem?
A) The VLAN ID on the link connected to host2 must be changed to VLAN 100.
B) A DCI connection must be created between the VLANs.
C) A Layer 3 VXLAN gateway must be configured on at least one of the devices.
D) Host1 and host2 must be placed in the same VRF.

A) The VLAN ID on the link connected to host2 must be changed to VLAN 100.
B) A DCI connection must be created between the VLANs.
C) A Layer 3 VXLAN gateway must be configured on at least one of the devices.
D) Host1 and host2 must be placed in the same VRF.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
Referring to the exhibit, what would cause the problem on VCP 0/50? 
A) The VCP has been disabled through configuration.
B) The remote side is not configured as a VCP.
C) VCP 0/50 is configured as a network port.
D) The port is missing the interface hardware.

A) The VCP has been disabled through configuration.
B) The remote side is not configured as a VCP.
C) VCP 0/50 is configured as a network port.
D) The port is missing the interface hardware.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
The MC-LAG group shown in the exhibit is providing high availability services for the directly connected servers. The backup liveness detection is applied to the ICL-PL link, however, when one of the members rebooted, there was traffic loss for a few seconds.
In this scenario, where should you apply the backup liveness detection?
A) on the ae1 interface
B) on the ae2 interface
C) on the management interfaces
D) on the ae0 interface

A) on the ae1 interface
B) on the ae2 interface
C) on the management interfaces
D) on the ae0 interface
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
A VXLAN has been created between devices leaf1 and leaf3.
Referring to the exhibit, which statement is true?
A) Traffic sent from host1 to host2 will be tagged with VLAN ID 200 when exiting leaf3.
B) Traffic sent from leaf1 to host2 will he dropped on leaf1.
C) Traffic sent from host1 to host2 will be tagged with VLAN ID 100 when exiting leaf3.
D) Traffic sent from leaf1 to host2 will he dropped on leaf3.

A) Traffic sent from host1 to host2 will be tagged with VLAN ID 200 when exiting leaf3.
B) Traffic sent from leaf1 to host2 will he dropped on leaf1.
C) Traffic sent from host1 to host2 will be tagged with VLAN ID 100 when exiting leaf3.
D) Traffic sent from leaf1 to host2 will he dropped on leaf3.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
You are building a new IP fabric data center underlay network and want to ensure predictable load-balancing behavior for traffic traversing the fabric. What are two approaches you should take to satisfy the requirement in this scenario? (Choose two.)
A) Ensure that all uplinks are 40GbE.
B) Ensure that every leaf node has a link to every other leaf node.
C) Ensure that every leaf node has an uplink to every spine node.
D) Ensure that all spine devices are the same switch model.
A) Ensure that all uplinks are 40GbE.
B) Ensure that every leaf node has a link to every other leaf node.
C) Ensure that every leaf node has an uplink to every spine node.
D) Ensure that all spine devices are the same switch model.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
You have configured MP-IBGP to support EVPN for your overlay network. However, you are not seeing the expected routes on your edge devices.
Referring to the exhibit, how would you solve this problem?
A) The family evpn signaling parameter must be configured on the remote peer. The family evpn signaling parameter must be configured on the remote peer.
B) Graceful restart must be disabled for this session.
C) The group types on both devices should be set to external . The group types on both devices should be set to external .
D) The family 12vpn signaling must be configured on the local peer. The family 12vpn signaling must be configured on the local peer.

A) The family evpn signaling parameter must be configured on the remote peer. The family evpn signaling parameter must be configured on the remote peer.
B) Graceful restart must be disabled for this session.
C) The group types on both devices should be set to external . The group types on both devices should be set to external .
D) The family 12vpn signaling must be configured on the local peer. The family 12vpn signaling must be configured on the local peer.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck