Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does Nokia’s Fabric Services System use a fabric intent to build the DC switch fabric?

A.

It uses a YAML file that defines the intended configuration state of the DC fabric.

B.

It uses a digital sandbox to connect workloads to the DC fabric.

C.

It uses a digital sandbox to build the configuration files for the DC fabric.

D.

It uses telemetry data to build the configuration files for the DC fabric.

Which of the following is NOT how prefixes are typically learned and advertised in a leaf and spine data center?

A.

Spine routers advertise learned prefixes to leaf routers directly using eBGP.

B.

Spine routers learn prefixes from leaf routers directly using eBGP.

C.

Each leaf router advertises the prefixes of its own locally connected servers.

D.

Each leaf router learns the prefixes of remote servers from other leaf routers directly using eBGP.

Which of the following statements about the CLI modes in Nokia’s SR Linux is FALSE?

A.

The state mode displays the current configuration and operational information.

B.

The show mode uses pre-defined reports to display operational information.

C.

The running mode is used to make configuration changes.

D.

Users can switch from one mode to another using the enter command.

Which of the following statements about the YANG model used in Nokia’s SR Linux is FALSE?

A.

All configuration and state information is defined as a YANG model.

B.

The YANG model uses a tree structure with “leafs” as the branches and “containers” as the data components.

C.

The YANG model can be converted into other formats such as JSON or XML.

D.

The YANG model provides a standardized way for applications to retrieve SR Linux configuration and state information.

Which of the following statements about IP-VRFs in Nokia’s SR Linux is FALSE?

A.

An IP-VRF is a Layer 3 network instance.

B.

Packets in an IP-VRF are forwarded based on the destination IP address.

C.

The router maintains a distinct route table for each IP-VRF instance.

D.

Multiple servers can be connected to the same subnet in an IP-VRF.

Based on the exhibit output, which of the following is NOT the reason the user runs the “baseline diff” command?

A.

User admin is not able to commit their changes.

B.

Another user has committed changes.

C.

User admin wants to check if there are differences between the current running config and their baseline datastore.

D.

User admin notices that “!” appears in the CLI prompt.

Which of the following statements about the data center’s leaf-spine topology (clos network) is FALSE?

A.

Each leaf router is connected to all the spine routers in the cluster.

B.

It provides a consistent path for east-west traffic.

C.

It uses the spanning tree protocol to avoid forwarding loops.

D.

It uses ECMP to distribute traffic across duplicate links.

Which of the following is NOT one of the characteristics of Nokia’s SR Linux?

A.

It uses an unmodified Linux kernel that simplifies the use of third party applications.

B.

It uses a modular, state-driven architecture that gives applications efficient access to system information.

C.

It includes a NetOgs development kit that supports the integration of third-party applications.

D.

It uses mature and stable SNMP protocol to access the command line interface.

Which of the following statements about SR Linux interfaces is FALSE?

A.

Only one management interface is allowed.

B.

Network interfaces are associated with physical ports on the linecards.

C.

The loopback interface is a physical interface directly connected to another interface on the same chassis.

D.

Layer 2 parameters such as MTU are configured at the SR Linux interface level while Layer 3 parameters are configured at the subinterface level.

Which of the following statements about a CPM-filter policer is FALSE?

A.

Hierarchical policing of control plane traffic is supported.

B.

The system-cpu-policer is hardware-based.

C.

The system-cpu-policer acts on the aggregate traffic from all line cards.

D.

CPM-filter entries can use both a distributed-policer and a system-cpu-policer.