New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-683 Exam Dumps - Data Center Professional (JNCIP-DC) Exam

Go to page:
Question # 4

You want to convert an MX Series router from a VXLAN Layer 2 gateway to a VXLAN Layer 3 gateway for VNI 100. You have already configured an IRB interface. In this scenario, which command would you use to accomplish this task?

A.

set protocols isis interface irb.100 passive

B.

set vlans VLAN-100 13-interface irb.100

C.

set bridge-domains VLAN-100 routing-interface irb.100

D.

set protocols ospf area 0.0.0.0 interface irb.100 passive

Full Access
Question # 5

A local VTEP has two ECMP paths to a remote VTEP

Which two statements are correctwhen load balancing is enabled in this scenario? (Choose two.)

A.

The inner packet fields are not used in the hash for load balancing.

B.

The destination port in the UDP header is used to load balance VXLAN traffic.

C.

The source port in the UDP header is used to load balance VXLAN traffic.

D.

The inner packet fields are used in the hash for load balancing.

Full Access
Question # 6

What are three actions available tor MAC move limiting? (Choose three.)

A.

drop

B.

filter

C.

enable

D.

log

E.

shutdown

Full Access
Question # 7

Exhibit.

Referring to the exhibit, Host1 (10.1.1.1) is failing to communicate with Host2 (10.1.2.1) in a data center that uses an ERB architecture. What do you determine from the output?

A.

The traffic is failing because load balancing is not configured correctly.

B.

The traffic is entering the VXLAN tunnel.

C.

Host1 and Host2 are directly connected to leaf1.

D.

The irb.20 interface is not configured on leaf1.

Full Access
Question # 8

You are adding a server lo a tenant's network within your data center and must limit access to a specific traffic type within the tenant network without pushing all tenant traffic through a firewall.

What will satisfy this requirement?

A.

Use route leaking with EVPN and a routing policy.

B.

Use filter-based forwarding.

C.

Put the new server on a unique subnet within the tenant's network.

D.

Use a static route in the tenant VRF with a firewall as the next hop for traffic to the new server.

Full Access
Go to page: