ExamGecko
Home Home / Juniper / JN0-682

Juniper JN0-682 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which two statements describe EVPN based VXLAN implementations? (Choose two.)

A.
MAC addresses ate propagated using BGP updates
A.
MAC addresses ate propagated using BGP updates
Answers
B.
MAC addresses are learned using multicast flooding
B.
MAC addresses are learned using multicast flooding
Answers
C.
The movement of a virtual host results in the dynamic remapping of the VTEP
C.
The movement of a virtual host results in the dynamic remapping of the VTEP
Answers
D.
The movement of a virtual host requires a manual reconfiguration of the VTEP
D.
The movement of a virtual host requires a manual reconfiguration of the VTEP
Answers
Suggested answer: A, C

Explanation:

A) In EVPN based VXLAN implementations, MAC addresses are propagated through BGP updates, which helps in efficient and scalable MAC address dissemination across the network.

C) The movement of a virtual host in an EVPN VXLAN environment triggers the dynamic remapping of the VTEP (VXLAN Tunnel Endpoint), ensuring that traffic is always routed to the current location of the host.

Juniper Networks - EVPN VXLAN Configuration Guide

You host a multitenant data center that runs VMware. You must perform deep packet inspection on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device. In this scenario, what should you do to solve this problem?

A.
Use separate vswitches to isolate each-tenant's network and use and use a vSRX device to evaluate inter-tenant traffic.
A.
Use separate vswitches to isolate each-tenant's network and use and use a vSRX device to evaluate inter-tenant traffic.
Answers
B.
Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.
B.
Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.
Answers
C.
Use a VLANs to isolate each tenant's network and use IP tables to evaluates inter-tenant traffic.
C.
Use a VLANs to isolate each tenant's network and use IP tables to evaluates inter-tenant traffic.
Answers
D.
Use a vMX device to isolate each tenant's network and use firewall filters to evaluate inter-tenant traffic.
D.
Use a vMX device to isolate each tenant's network and use firewall filters to evaluate inter-tenant traffic.
Answers
Suggested answer: A

Explanation:

Using separate vSwitches for each tenant's network in conjunction with a vSRX device allows for effective isolation and deep packet inspection of inter-tenant traffic. The vSRX can inspect traffic at the hypervisor level without the need for traffic to leave the physical device.

Juniper Networks - vSRX Virtual Firewall

Which two statements describe MAC address learning for VPLS and EVPN? (Choose two.)

A.
VPLS learns MAC addresses in the data plane
A.
VPLS learns MAC addresses in the data plane
Answers
B.
EVPN learns MAC addresses in the data plane
B.
EVPN learns MAC addresses in the data plane
Answers
C.
EPLS learns MAC addresses in the control plane
C.
EPLS learns MAC addresses in the control plane
Answers
D.
EVPN learns MAC addresses in the control plane
D.
EVPN learns MAC addresses in the control plane
Answers
Suggested answer: A, D

Explanation:

A) VPLS (Virtual Private LAN Service) learns MAC addresses in the data plane, meaning the learning process occurs as the traffic flows through the network.

D) EVPN (Ethernet VPN) differs from VPLS in that it learns MAC addresses in the control plane, using BGP for MAC address dissemination, which offers better scalability and control.

Juniper Networks - Understanding VPLS

Juniper Networks - Understanding EVPN

Referring to the VTEP output shown in the exhibit, which two statements are true? (Choose two.)

A.
The. MAC address 52:54:00 5e 88 6a belongs to a remote host.
A.
The. MAC address 52:54:00 5e 88 6a belongs to a remote host.
Answers
B.
The MAC address 52:54;00 5e 88 6a belongs to a local host.
B.
The MAC address 52:54;00 5e 88 6a belongs to a local host.
Answers
C.
The MAC address 52:54:00 2c 4b:a2 belongs to a remote host.
C.
The MAC address 52:54:00 2c 4b:a2 belongs to a remote host.
Answers
D.
The MAC address 52:54:00 2c 4b:a2 belongs to a local host.
D.
The MAC address 52:54:00 2c 4b:a2 belongs to a local host.
Answers
Suggested answer: A, C

You need to add perimeter security to the network shown in the exhibit. All traffic must be inspected for attacks. The edge routers are using all available ports. Your solution must maintain both port and device resiliency.

In this scenario, which design would satisfy these requirements?

A.
one-arm SRX Series chassis cluster
A.
one-arm SRX Series chassis cluster
Answers
B.
one-arm SRX Series device using LAG
B.
one-arm SRX Series device using LAG
Answers
C.
inline SRX Series chassis cluster
C.
inline SRX Series chassis cluster
Answers
D.
inline SRX Series device using LAG
D.
inline SRX Series device using LAG
Answers
Suggested answer: C

Referring to the exhibit,

you have a data center in which only the spine devices are using EVPN and VXLAN. The leaf nodes are multihomed in active-active mode to the spine nodes through ESI LAG interfaces. In this design, a link failure on the interface connecting the spine nodes would also cause all traffic from the spine to the leaf nodes to drop.

In this scenario, which command configured on which nodes would solve this problem?

A.
the disable protocols evpn no-core-isolation command on the spine nodes
A.
the disable protocols evpn no-core-isolation command on the spine nodes
Answers
B.
the set protocols evpn no-core-isolation command on the spine nodes
B.
the set protocols evpn no-core-isolation command on the spine nodes
Answers
C.
the disable protocols evpn no-core-isolation command on the leaf nodes
C.
the disable protocols evpn no-core-isolation command on the leaf nodes
Answers
D.
the set protocols evpn no-core-isolation command on the leaf nodes
D.
the set protocols evpn no-core-isolation command on the leaf nodes
Answers
Suggested answer: A

You are evaluating which method to use for learning MAC addresses in your VXLAN network. Which statement is true in this scenario?

A.
Multicast exchanges MAC addresses through data plane learning and is more reliable than EVPN.
A.
Multicast exchanges MAC addresses through data plane learning and is more reliable than EVPN.
Answers
B.
EVPN exchanges MAC addresses through control plane learning and is more reliable than multicast.
B.
EVPN exchanges MAC addresses through control plane learning and is more reliable than multicast.
Answers
C.
EVPN exchanges MAC addresses through data plane learning and is more reliable than multicast.
C.
EVPN exchanges MAC addresses through data plane learning and is more reliable than multicast.
Answers
D.
Multicast exchanges MAC addresses through control plane learning and is not more reliable than EVPN.
D.
Multicast exchanges MAC addresses through control plane learning and is not more reliable than EVPN.
Answers
Suggested answer: B

Explanation:

Ethernet VPN (EVPN) provides control plane-based MAC address learning. This means that MAC addresses are exchanged and learned via BGP messages rather than through traditional data plane flooding. This approach is more scalable and reliable compared to multicast-based MAC address learning, where MAC addresses are learned through data plane flooding. Control plane learning with EVPN is less prone to issues like broadcast storms and provides a more efficient and stable mechanism for MAC address dissemination in large-scale networks.

Reference: Juniper Networks EVPN Overview and Configuration Guide.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.
Seamless EVPN VXLAN stitching is in use.
A.
Seamless EVPN VXLAN stitching is in use.
Answers
B.
Switch01 is a spine device.
B.
Switch01 is a spine device.
Answers
C.
An OTT data center interconnect is in use.
C.
An OTT data center interconnect is in use.
Answers
D.
Switch01 is a leaf device.
D.
Switch01 is a leaf device.
Answers
Suggested answer: A, D

You are asked to implement a monitoring and telemetry solution for the QFX Series devices in your IP fabric that uses a push model to collect both system event data and statistical data for your QFX Series devices.

Which technology satisfies your requirements?

A.
JunosXMLAPI
A.
JunosXMLAPI
Answers
B.
REST API
B.
REST API
Answers
C.
SNMP
C.
SNMP
Answers
D.
Junos Telemetry Interface
D.
Junos Telemetry Interface
Answers
Suggested answer: D

Explanation:

The Junos Telemetry Interface (JTI) is the ideal solution for monitoring and telemetry in an IP fabric using QFX Series devices. JTI uses a push model to stream system event data and statistical data from the devices. It provides real-time, granular monitoring capabilities, which is more efficient and scalable compared to traditional polling methods like SNMP. By pushing data to a telemetry server, JTI allows for more dynamic and immediate insights into network performance and health.

Reference: Juniper Networks QFX Series Documentation - Junos Telemetry Interface.

You are configuring an MX Series router to act as a Layer 3 gateway to route traffic between VXLANs in different data centers across a WAN connection. In this scenario, what must you do to enable this communication?

A.
Configure route reflectors.
A.
Configure route reflectors.
Answers
B.
Change the UDP port used by the VXLANs.
B.
Change the UDP port used by the VXLANs.
Answers
C.
Configure the IRB interfaces to connect the VXLANs.
C.
Configure the IRB interfaces to connect the VXLANs.
Answers
D.
Enable PIM on all interfaces.
D.
Enable PIM on all interfaces.
Answers
Suggested answer: C

Explanation:

To enable communication between VXLANs in different data centers across a WAN connection using an MX Series router, Integrated Routing and Bridging (IRB) interfaces must be configured. IRB interfaces provide Layer 3 routing capabilities within a VXLAN overlay network, allowing for inter-VXLAN routing. By configuring IRB interfaces on the MX router, you enable it to act as a Layer 3 gateway, routing traffic between the different VXLANs across the data centers.

Reference: Juniper Networks MX Series Documentation - VXLAN and EVPN Configuration.

Total 154 questions
Go to page: of 16