Which two combinations are supported when configuring a Virtual Chassis Fabric? (Choose two.)

Which two combinations are supported when configuring a Virtual Chassis Fabric? (Choose two.)A . Four spine nods and 20 leaf nodes B. Four spine nods with 16 leaf nodes C. two spine nods and 16 leaf nodes D. Two spine and 28 leaf nodesView AnswerAnswer: B,C

September 10, 2022 No Comments READ MORE +

Which two statements are true Virtual Chassis? (Choose two.)

Which two statements are true Virtual Chassis? (Choose two.)A . By default, Junos switches are in non-mixed mode virtual chassis. B. The request virtual-chassis mode fabric reboot command will set the Virtual Chassis to fabric mode with similar devices C. By default, Junos switches are in a mixes mode Virtual...

September 10, 2022 No Comments READ MORE +

Which IP fabric underlay protocol provides the highest degree of scalability?

Which IP fabric underlay protocol provides the highest degree of scalability?A . IS-IS B. RIP C. EBGP D. OSPFView AnswerAnswer: C

September 9, 2022 No Comments READ MORE +

In this scenario, which statement is true?

Referring to the exhibit, DC1 and DC2 have a DCI across a service provider WAN connection. Host1 in DC1 must have Layer 2 connectivity to host2 in DC2. A VXLAN tunnel must be created between VTEP1 and VTEP2. In this scenario, which statement is true?A . The service provider WAN...

March 18, 2022 No Comments READ MORE +

In this scenario, what are three advantages of using MPLS EVPN interconnects?

A client with five data centers spread around the country uses MPLS L2VPNs to provide point-to-point data center Interconnects between each data center in a full-mesh network. The client is considering an MPLS EVPN implementation. In this scenario, what are three advantages of using MPLS EVPN interconnects? (Choose three.)A ....

March 18, 2022 No Comments READ MORE +

In this scenario, which design would satisfy these requirements?

You are implementing perimeter security for your data center. You need to inspect all traffic at Layer 7 and ensure the failure of a port or device will not result in an interruption to traffic flows. In this scenario, which design would satisfy these requirements?A . SRX using LAGB ....

March 18, 2022 No Comments READ MORE +

In this scenario, which design would satisfy these requirements?

You need to add perimeter security to the network shown in the exhibit. All traffic must be inspected for attacks. The edge routers are using all available ports. Your solution must maintain both port and device resiliency. In this scenario, which design would satisfy these requirements?A . one-arm SRX Series...

March 18, 2022 No Comments READ MORE +

In this scenario, which BGP parameter would solve this problem?

Referring to the exhibit, not all routes are being exchanged by EBGP peers. In this scenario, which BGP parameter would solve this problem?A . multihopB . multipathC . multipath multiple-asD . as-overrideView AnswerAnswer: D

March 15, 2022 No Comments READ MORE +

In this scenario, what should you configure on the leaf devices to accomplish this task?

You are configuring an EVPN overlay network. You want to ensure that leaf devices can respond to ARP requests from locally connected hosts, when the leaf device knows the MAC of the intended destination. In this scenario, what should you configure on the leaf devices to accomplish this task?A ....

March 15, 2022 No Comments READ MORE +

You are designing a network for a small data center. In this scenario, which underlay protocol allows for the simplest implementation?

You are designing a network for a small data center. In this scenario, which underlay protocol allows for the simplest implementation?A . OSPFB . IBGPC . EBGPD . MPLSView AnswerAnswer: A

March 14, 2022 No Comments READ MORE +