After configuring an IP fabric using EBGP as your routing protocol, you notice that not all of the routes are showing up in the routing tables. You have verified that all adjacencies have formed, and that all policies are in place and configured properly.
In this scenario, which statement is true?
A. The routers have not been configured with the multipath multiple-as parameter.
B. The routers have not been configured using the add-path parameter.
C. The routers have not been configured using the bfd-liveness-detection parameter.
D. The routers have not been configured using the multihop parameter.
You are configuring an EVPN overlay network. You want to ensure that leaf devices can respond to ARP requests from locally connected hosts, when the leaf device knows the MAC of the intended destination.
In this scenario, what should you configure on the leaf devices to accomplish this task?
A. proxy ARP
B. static ARP entries
C. persistent MAC learning
D. IGMP snooping
Which two statements describe MAC address learning for VPLS and EVPN? (Choose two.)
A. EVPN learns MAC addresses in the data plane.
B. VPLS learns MAC addresses in the control plane.
C. VPLS learns MAC addresses in the data plane.
D. EVPN learns MAC addresses in the control plane.
You host a multitenant data center that runs VMware. You must perform deep packet inspection on all inter-tenant traffic that is flowing between the VMs within the same hypervisor. Your solution must provide the security services without needing to leave the physical device.
In this scenario, what should you do to solve this problem?
A. Use separate vSwitches to isolate each tenant's networks and use IP tables to evaluate inter-tenant traffic.
B. Use VLANs to isolate each tenant's networks and use an SRX Series device to evaluate inter-tenant traffic.
C. Use a vMX device to isolate each tenant's networks and use with firewall filters to evaluate inter-tenant traffic.
D. Use separate vSwitches to isolate each tenant's networks and use a vSRX Series device to evaluate inter-tenant traffic.
A client with five data centers spread around the country uses MPLS L2VPNs to provide point-to-point data center Interconnects between each data center in a full-mesh network. The client is considering an MPLS EVPN implementation.
In this scenario, what are three advantages of using MPLS EVPN interconnects? (Choose three.)
A. They provide for static configuration that does not require a Dynamic Routing Protocol.
B. They provide for lower transmission latency.
C. They provide for a local proxy ARP/ND resolution.
D. They provide for point-to-multipoint connectivity.
E. They provide for MAC learning in the control plane.
You work in a data center where VMs and hosts are frequently moved. Your design needs to eliminate inefficient traffic flows.
In this scenario, which two solutions will satisfy this requirement? (Choose two.)
A. VXLAN
B. EVPN
C. VMTO
D. VPLS
A VXLAN adds 50 to 54 bytes of extra header information to an Ethernet frame. In this scenario, how would you accommodate this increase?
A. Decrease the number VXLANs used.
B. Increase the MTU on the physical interface connected to the VXLAN network.
C. Only use switches as VTEPs.
D. Increase the MTU on the VTEP interface connected to the VXLAN network.
You are configuring VXLAN, and you must ensure that all switches for the multicast groups advertise their existence and learn about other VTEPs.
In this scenario, which protocol will accomplish this task?
A. OSPF
B. BGP
C. EVPN
D. PIM
Which statement is true about a Data Center Interconnect over an IP network?
A. Layer 2 data must traverse a point-to-point link.
B. Layer 2 data must traverse an MPLS LSP.
C. Layer 2 data must be encapsulated.
D. Layer 3 data must be encapsulated.
You are designing a Layer 3 fabric underlay using EBGP. You will implement an EVPN-signaled VXLAN overlay on the Layer 3 fabric.
In this scenario, what must you do in the underlay to ensure that the VXLAN overlay will be able to function properly?
A. The underlay should advertise the host-connected interfaces on all leaf devices.
B. Each device in the underlay should advertise its loopback address.
C. The underlay should be configured with a separate VRF for each potential tenant.
D. The underlay should support the PIM protocol.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-681 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.