You are implementing perimeter security for your data center. You need to inspect all traffic at Layer 7 and ensure the failure of a port or device will not result in an interruption to traffic flows.
In this scenario, which design would satisfy these requirements? A . SRX using LAG B . MX with MC-LAG C . QFX Virtual Chassis D . SRX chassis cluster
You are designing an EBGP IP fabric for a multi-site data center. In this scenario, which two statements are true? (Choose two.) A . Public AS numbers must be used. B . Different AS numbers should be used on all devices. C . The same AS number should be used on all devices across all data centers. D . Private AS numbers can be used.
Referring to the exhibit, DC1 and DC2 have a DCI across a service provider WAN connection. Host1 in DC1 must have Layer 2 connectivity to host2 in DC2. A VXLAN tunnel must be created between VTEP1 and VTEP2.
In this scenario, which statement is true? A . The service provider WAN connection cannot be an MPLS-based WAN connection. B . VXLAN Layer 3 gateway must be provisioned at the Super Spine layer. C . A route to the loopback address on VTEP2 must be present on VTEP1. D . VTEP1 and VTEP2 must peer using IBG
You are asked to manage the oversubscription ratio of your spine and leaf IP fabric. You determine that you are at a 3:1 ratio of downstream to upstream traffic and must achieve a 1:1 ratio.
In this scenario, which two actions would you take to achieve this goal? (Choose two.) A . Increase the number of server-facing ports that each leaf node uses to carry traffic. B . Reduce the number of server-facing ports that each leaf node uses to carry traffic. C . Increase the number of spine nodes in your design. D . Reduce the number of leaf nodes in your design.
An EVPN-signaled VXLAN overlay has been deployed in the network shown in the exhibit. Host1 is a bare metal server, and is dual-homed to the network. The IP addresses 10.1.1.1/24 and 10.1.1.2/24 are assigned to the same physical NIC, and no virtualization is configured on the server.
In this scenario, which two statements are true? (Choose two.) A . The MAC address associated with 10.1.1.1/24 and 10.1.1.2/24 will be the same when advertised to leaf3. B . The connection from host1 to devices leaf1 and leaf2 must be configured as a LA D . Traffic from IP address 10.1.1.1/24 must traverse the VXLAN network to reach IP address 10.1.1.2/24. E . The ESI assigned to the leaf1-host1 link must be the same as the ESI assigned to the leaf2-hostl link.
After configuring an IP fabric using EBGP as your routing protocol, you notice that not all of the routes are showing up in the routing tables. You have verified that all adjacencies have formed, and that all policies are in place and configured properly.
In this scenario, which statement is true? A . The routers have not been configured with the multipath multiple-asparameter. B . The routers have not been configured using the add-pathparameter. C . The routers have not been configured using the bfd-liveness-detectionparameter. D . The routers have not been configured using the multihopparameter.
Which statement is true about a Data Center Interconnect over an IP network? A . Layer 2 data must traverse a point-to-point link. B . Layer 2 data must traverse an MPLS LS D . Layer 2 data must be encapsulated. E . Layer 3 data must be encapsulated.
Which two statements describe MAC address learning for VPLS and EVPN? (Choose two.) A . EVPN learns MAC addresses in the data plane. B . VPLS learns MAC addresses in the control plane. C . VPLS learns MAC addresses in the data plane. D . EVPN learns MAC addresses in the control plane.
You host a multitenant data center that runs VMware. You must perform deep packet inspection on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device.
In this scenario, what should you do to solve this problem? A . Use separate vSwitches to isolate each tenant’s networks and use IP tables to evaluate inter-tenant traffic. B . Use VLANs to isolate each tenant’s networks and use an SRX Series device to evaluate inter-tenant traffic. C . Use a vMX device to isolate each tenant’s networks and use with firewall filters to evaluate inter-tenant traffic. D . Use separate vSwitches to isolate each tenant’s networks and use a vSRX Series device to evaluate inter-tenant traffic.