image


JN0-682 Dumps

JN0-682 Braindumps JN0-682 Real Questions JN0-682 Practice Test

JN0-682 Actual Questions


Juniper


JN0-682


Data Center, Professional (JNCIP-DC)


https://killexams.com/pass4sure/exam-detail/JN0-682

Question: 53


Which statement is true about a Data Center Interconnect over an IP network?

  1. Layer 2 data must traverse a point-to-point link.

  2. Layer 2 data must traverse an MPLS LS

  1. Layer 2 data must be encapsulated.

  2. Layer 3 data must be encapsulated.


Answer: C


Question: 54


You work in a data center where VMs and hosts are frequently moved. Your design needs to eliminate inefficient traffic flows.


In this scenario, which two solutions will satisfy this requirement? (Choose two.)

  1. VXLAN

  2. EVPN

  3. VMTO

  4. VPLS


Answer: B, C


Question: 55

A VXLAN adds 50 to 54 bytes of extra header information to an Ethernet frame. In this scenario, how would you accommodate this increase?

  1. Decrease the number VXLANs used.

  2. Increase the MTU on the physical interface connected to the VXLAN network.

  3. Only use switches as VTEPs.

  4. Increase the MTU on the VTEP interface connected to the VXLAN network.


Answer: B


Question: 56


You host a multitenant data center that runs VMware. You must perform deep packet inspection on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device.


In this scenario, what should you do to solve this problem?

  1. Use separate vSwitches to isolate each tenant’s networks and use IP tables to evaluate inter-tenant traffic.

  2. Use VLANs to isolate each tenant’s networks and use an SRX Series device to evaluate inter-tenant traffic.

  3. Use a vMX device to isolate each tenant’s networks and use with firewall filters to evaluate inter-tenant traffic.

  4. Use separate vSwitches to isolate each tenant’s networks and use a vSRX Series device to evaluate inter-tenant traffic.


Answer: D


Question: 57


Which two statements describe MAC address learning for VPLS and EVPN? (Choose two.)

  1. EVPN learns MAC addresses in the data plane.

  2. VPLS learns MAC addresses in the control plane.

  3. VPLS learns MAC addresses in the data plane.

  4. EVPN learns MAC addresses in the control plane.


Answer: C, D


Question: 58


You are asked to manage the oversubscription ratio of your spine and leaf IP fabric. You determine that you are at a 3:1 ratio of downstream to upstream traffic and must achieve a 1:1 ratio.


In this scenario, which two actions would you take to achieve this goal? (Choose two.)

  1. Increase the number of server-facing ports that each leaf node uses to carry traffic.

  2. Reduce the number of server-facing ports that each leaf node uses to carry traffic.

  3. Increase the number of spine nodes in your design.

  4. Reduce the number of leaf nodes in your design.


Answer: B, C


Question: 59


You are logged in to Leaf 1.


image

When examining the routing table, you notice that you have no routes from Leaf 2.


Referring to the exhibit, which two commands would you use to troubleshoot the problem? (Choose two.)

  1. From Leaf 2, issue the show route advertising-protocol bgp 172.16.1.2command.

  2. From Spine 1, issue the show route advertising-protocol bgp 172.16.1.1command.

  3. From Spine 1, issue the show route advertising-protocol bgp 172.16.1.2command.

  4. From Leaf 1, issue the show route receive-protocol bgp 172.16.1.1command.


Answer: C, D


Question: 60


A company wants to expand their hosting business and is seeking solutions to support multiple tenants. Each tenant should be able to configure their own logical interfaces. Also, based on customer needs, all routing features must be supported.


What will satisfy the customer’s requirements?

  1. routing instances

  2. tenant systems

  3. logical systems

  4. bridge domains


Answer: A


Question: 61


An EVPN-signaled VXLAN overlay has been deployed in the network shown in the exhibit. Host1 is a bare metal server, and is dual-homed to the network. The IP addresses 10.1.1.1/24 and 10.1.1.2/24 are assigned to the same physical NIC, and no virtualization is configured on the server.


image


In this scenario, which two statements are true? (Choose two.)

  1. The MAC address associated with 10.1.1.1/24 and 10.1.1.2/24 will be the same when advertised to leaf3.

  2. The connection from host1 to devices leaf1 and leaf2 must be configured as a LA

  1. Traffic from IP address 10.1.1.1/24 must traverse the VXLAN network to reach IP address 10.1.1.2/24.

  2. The ESI assigned to the leaf1-host1 link must be the same as the ESI assigned to the leaf2-hostl link.


Answer: C, D


Question: 62


You are designing a Layer 3 fabric underlay using EBGP. You will implement an EVPN-signaled VXLAN overlay on the Layer 3 fabric.


In this scenario, what must you do in the underlay to ensure that the VXLAN overlay will be able to function properly?

  1. The underlay should advertise the host-connected interfaces on all leaf devices.

  2. Each device in the underlay should advertise its loopback address.

  3. The underlay should be configured with a separate VRF for each potential tenant.

  4. The underlay should support the PIM protocol.

Answer: B


Question: 63


After configuring an IP fabric using EBGP as your routing protocol, you notice that not all of the routes are showing up in the routing tables. You have verified that all adjacencies have formed, and that all policies are in place and configured properly.


In this scenario, which statement is true?

  1. The routers have not been configured with the multipath multiple-asparameter.

  2. The routers have not been configured using the add-pathparameter.

  3. The routers have not been configured using the bfd-liveness-detectionparameter.

  4. The routers have not been configured using the multihopparameter.


Answer: D


Question: 64


You are designing an EBGP IP fabric for a multi-site data center. In this scenario, which two statements are true? (Choose two.)

  1. Public AS numbers must be used.

  2. Different AS numbers should be used on all devices.

  3. The same AS number should be used on all devices across all data centers.

  4. Private AS numbers can be used.


Answer: B, D


Question: 65


You are configuring VXLAN, and you must ensure that all switches for the multicast groups advertise their existence and learn about other VTEPs.


In this scenario, which protocol will accomplish this task?

  1. OSPF

  2. BGP

  3. EVPN

  4. PIM


Answer: D


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG