New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

JNCIP-DC JN0-682 Full Course Free

Page: 11 / 12
Total 154 questions

Data Center Professional (JNCIP-DC) Questions and Answers

Question 41

A client with five data centers spread around the country uses MPLS L2VPNs to provides point- to- point data center interconnect between each data center in a full-mesh network. The client Is considering an MPLS EVEN implementation.

In this scenario, what are three advantages of using MPL5 EVEN interconnects? (Choose two.)

Options:

A.

The provide for static configuration that does not require a Dynamic Routing Protocol

B.

They provide for a local proxy ARP/ND resolution.

C.

They provide for point to multipoint connectivity

D.

They provide for a MAC learning in the control plane.

E.

They provide for lower transmission latency.

Question 42

Which EVPN router type prevents BUM traffic from looping back to a multihued host?

Options:

A.

Ethernet segment router

B.

IP prefix route

C.

Ether auto discovery route

D.

Inclusive multicast-Ethernet tag route

Question 43

Referring to the VTEP output shown in the exhibit, which two statements are true?(Choose two.)

Options:

A.

The. MAC address 52:54:00 5e 88 6a belongs to a remote host.

B.

The MAC address 52:54;00 5e 88 6a belongs to a local host.

C.

The MAC address 52:54:00 2c 4b:a2 belongs to a remote host.

D.

The MAC address 52:54:00 2c 4b:a2 belongs to a local host.

Question 44

You host a multitenant data center that runs VMware. You must perform deep packet inspection

on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device. In this scenario, what should you do to solve this problem?

Options:

A.

Use separate vswitches to isolate each-tenant's network and use and use a vSRX device to evaluate inter-tenant traffic.

B.

Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.

C.

Use a VLANs to isolate each tenant's network and use IP tables to evaluates inter-tenant traffic.

D.

Use a vMX device to isolate each tenant's network and use firewall filters to evaluate inter-tenant traffic.

Page: 11 / 12
Total 154 questions