Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Nokia 4A0-D01 Nokia Data Center Fabric Fundamentals Exam Exam Practice Test

Page: 1 / 4
Total 35 questions

Nokia Data Center Fabric Fundamentals Exam Questions and Answers

Question 1

Which of the following statements about the VXLAN tunneling in data centers is FALSE?

Options:

A.

VXLAN tunnel endpoints can be on hypervisors, leaf routers, or datacenter gateways.

B.

EVPN routes are exchanged between VXLAN tunnel endpoints.

C.

Each VXLAN tunnel endpoint is automatically assigned with a unique VNI value.

D.

VXLAN tunneling is used to provide Layer 2 connectivity between workloads over a common underlay network.

Question 2

Based on the exhibit output, which of the following statements is TRUE?

Question # 2

Options:

A.

An ACL filter is configured to accept ICMP packets, which are then processed by the tcpdump-like utility.

B.

capture-filter is configured to copy ICMP packets to the CPM where they are processed by the tcpdump-like utility.

C.

A cpm-filter policer is configured to rate limit ICMP packets, which are then captured in a log file.

D.

A cpm-filter is configured to accept ICMP packets, which are then captured in a log file.

Question 3

Examine the exhibit. Which of the following statements is TRUE?

Question # 3

Options:

A.

A recursive lookup is performed to resolve 10.2.1.0 to use 10.1.1.0.

B.

A recursive lookup is performed to resolve 10.1.1.0 to use 10.2.1.0.

C.

The next-hop group for this static route is configured with two next-hops.

D.

The next-hop selected for this route will be based on the preference value configured for each next-hop.

Question 4

Which of the following statements about a CPM-filter policer is FALSE?

Options:

A.

Hierarchical policing of control plane traffic is supported.

B.

The system-cpu-policer is hardware-based.

C.

The system-cpu-policer acts on the aggregate traffic from all line cards.

D.

CPM-filter entries can use both a distributed-policer and a system-cpu-policer.

Question 5

Based on the MAC table output:

Question # 5

Which statement is FALSE?

Options:

A.

The MAC address 00:25:BA:00:00:10 is learnt on more than one interface.

B.

The MAC re-learning rate has exceeded the threshold within the specified time frame.

C.

Interface ethernet-1/10 is configured with the MAC address 00:25:BA:00:00:10.

D.

Mac-duplication detection is enabled in mac-vrf-1.

Question 6

Which of the following Nokia’s SR Linux ACLs is instantiated on all line cards to copy incoming packets to the CPM?

Options:

A.

Capture-filter ACL

B.

CPM-filter ACL

C.

Ingress ACL

D.

Egress ACL

Question 7

Which of the following statements about next-hop groups is TRUE?

Options:

A.

The next-hop for a next-hop-group must be a local IP address.

B.

Multiple static routes can use the same next-hop-group.

C.

ICMP destination unreachable message is always sent when blackhole is specified in the next-hop-group.

D.

A next-hop-group can only specify one next-hop for forwarding.

Question 8

Which of the following is NOT part of Day 2+ operations with Nokia’s Fabric Services System?

Options:

A.

Monitor the data center fabric using model-driven telemetry.

B.

Analyze the overall health of the data center fabric for proactive operations.

C.

Use the digital sandbox to test and validate configuration changes and upgrades.

D.

Use a fabric intent to build and validate design templates.

Question 9

Which of the following statements about the data center’s leaf-spine topology (clos network) is FALSE?

Options:

A.

Each leaf router is connected to all the spine routers in the cluster.

B.

It provides a consistent path for east-west traffic.

C.

It uses the spanning tree protocol to avoid forwarding loops.

D.

It uses ECMP to distribute traffic across duplicate links.

Question 10

How are LLDP frames advertised between two Nokia SR Linux routers?

Options:

A.

They are forwarded to the destination node based on the MAC VRF table.

B.

They are forwarded to the destination node based on the MAC VRF table. (Duplicate of A)

C.

They are periodically flooded to the broadcast MAC address on each interface.

D.

They are routed to the destination node based on the IP VRF forwarding table.

Page: 1 / 4
Total 35 questions