Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Nokia 4A0-D01 Nokia Data Center Fabric Fundamentals Exam Exam Practice Test

Demo: 10 questions
Total 35 questions

Nokia Data Center Fabric Fundamentals Exam Questions and Answers

Question 1

Which of the following statements about configuration checkpoints in Nokia SR Linux is FALSE?

Options:

A.

Checkpoint 0 is always the oldest checkpoint.

B.

The current running configuration can be saved as a JSON-formatted checkpoint file.

C.

The operator can revert to any existing checkpoint.

D.

The operator can generate a new checkpoint when committing configuration changes.

Question 2

Which of the following statements about next-hop groups is TRUE?

Options:

A.

The next-hop for a next-hop-group must be a local IP address.

B.

Multiple static routes can use the same next-hop-group.

C.

ICMP destination unreachable message is always sent when blackhole is specified in the next-hop-group.

D.

A next-hop-group can only specify one next-hop for forwarding.

Question 3

How does Nokia’s Fabric Services System use a fabric intent to build the DC switch fabric?

Options:

A.

It uses a YAML file that defines the intended configuration state of the DC fabric.

B.

It uses a digital sandbox to connect workloads to the DC fabric.

C.

It uses a digital sandbox to build the configuration files for the DC fabric.

D.

It uses telemetry data to build the configuration files for the DC fabric.

Question 4

Which of the following statements about the CLI modes in Nokia’s SR Linux is FALSE?

Options:

A.

The state mode displays the current configuration and operational information.

B.

The show mode uses pre-defined reports to display operational information.

C.

The running mode is used to make configuration changes.

D.

Users can switch from one mode to another using the enter command.

Question 5

Which of the following is NOT a valid logging source used in Nokia’s SR Linux?

Options:

A.

Linux facility + priority

B.

Console

C.

SR Linux subsystem + priority

D.

Syslog filter

Question 6

Which of the following statements about resilient ECMP load balancing is TRUE?

Options:

A.

The hash value used to distribute traffic is calculated as a modulo function on specific fields of the packet header.

B.

Hash buckets are used to ensure that flows egressing the same interface on one router use different egress interfaces on downstream routers.

C.

A different hash seed is used on downstream routers to ensure that flows are randomly distributed across all eligible router interfaces.

D.

When one of the next-hops fail, only flows currently egressing to that next-hop are impacted.

Question 7

Which of the following is NOT one of the characteristics of Nokia’s SR Linux?

Options:

A.

It uses an unmodified Linux kernel that simplifies the use of third party applications.

B.

It uses a modular, state-driven architecture that gives applications efficient access to system information.

C.

It includes a NetOgs development kit that supports the integration of third-party applications.

D.

It uses mature and stable SNMP protocol to access the command line interface.

Question 8

Which of the following statements about the YANG model used in Nokia’s SR Linux is FALSE?

Options:

A.

All configuration and state information is defined as a YANG model.

B.

The YANG model uses a tree structure with “leafs” as the branches and “containers” as the data components.

C.

The YANG model can be converted into other formats such as JSON or XML.

D.

The YANG model provides a standardized way for applications to retrieve SR Linux configuration and state information.

Question 9

Which of the following statements about a MAC-VRF is FALSE?

Options:

A.

A MAC-VRF is a Layer 2 network instance.

B.

Bridge table entries contain an exit interface for each destination address.

C.

Packets received in a MAC-VRF are forwarded based on destination IP address.

D.

Multiple devices can be connected to the same IP subnet using a MAC-VRF.

Question 10

Which of the following statements about multi-homing in EVPN is FALSE?

Options:

A.

Type 1 Ethernet Auto-Discovery (A-D) EVPN route is used to support EVPN multi-homing.

B.

Type 4 Ethernet Segment (ES) EVPN route is used for designated forwarder (DF) election for an ES.

C.

The ES identifier (ESI) uniquely identifies an ES and it is locally significant for a particular leaf.

D.

The Ethernet Segment (ES) identifies a set of links that connects a host to one or more leafs.

Demo: 10 questions
Total 35 questions