Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Nokia Certified Data Center Fabric Professional 4A0-D01 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 4A0-D01 Premium Access

View all detail and faqs for the 4A0-D01 exam


379 Students Passed

95% Average Score

92% Same Questions
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following statements about a CPM-filter policer is FALSE?

Options:

A.

Hierarchical policing of control plane traffic is supported.

B.

The system-cpu-policer is hardware-based.

C.

The system-cpu-policer acts on the aggregate traffic from all line cards.

D.

CPM-filter entries can use both a distributed-policer and a system-cpu-policer.

Questions # 2:

Which of the following statements about configuration checkpoints in Nokia SR Linux is FALSE?

Options:

A.

Checkpoint 0 is always the oldest checkpoint.

B.

The current running configuration can be saved as a JSON-formatted checkpoint file.

C.

The operator can revert to any existing checkpoint.

D.

The operator can generate a new checkpoint when committing configuration changes.

Questions # 3:

Which of the following statements about next-hop groups is TRUE?

Options:

A.

The next-hop for a next-hop-group must be a local IP address.

B.

Multiple static routes can use the same next-hop-group.

C.

ICMP destination unreachable message is always sent when blackhole is specified in the next-hop-group.

D.

A next-hop-group can only specify one next-hop for forwarding.

Questions # 4:

Which of the following statements about a MAC-VRF is FALSE?

Options:

A.

A MAC-VRF is a Layer 2 network instance.

B.

Bridge table entries contain an exit interface for each destination address.

C.

Packets received in a MAC-VRF are forwarded based on destination IP address.

D.

Multiple devices can be connected to the same IP subnet using a MAC-VRF.

Questions # 5:

Based on the exhibit output, what CLI command can be used to display the contents of "bgp-log" in Nokia’s SR Linux?

Question # 5

Options:

A.

show system logging buffer bgp-log

B.

show system logging file bgp-log

C.

info system logging buffer bgp-log

D.

info system logging file bgp-log

Questions # 6:

Which of the following statements about resilient ECMP load balancing is TRUE?

Options:

A.

The hash value used to distribute traffic is calculated as a modulo function on specific fields of the packet header.

B.

Hash buckets are used to ensure that flows egressing the same interface on one router use different egress interfaces on downstream routers.

C.

A different hash seed is used on downstream routers to ensure that flows are randomly distributed across all eligible router interfaces.

D.

When one of the next-hops fail, only flows currently egressing to that next-hop are impacted.

Questions # 7:

Examine the exhibit. Which of the following statements is TRUE?

Question # 7

Options:

A.

A recursive lookup is performed to resolve 10.2.1.0 to use 10.1.1.0.

B.

A recursive lookup is performed to resolve 10.1.1.0 to use 10.2.1.0.

C.

The next-hop group for this static route is configured with two next-hops.

D.

The next-hop selected for this route will be based on the preference value configured for each next-hop.

Questions # 8:

Which of the following is NOT part of Day 2+ operations with Nokia’s Fabric Services System?

Options:

A.

Monitor the data center fabric using model-driven telemetry.

B.

Analyze the overall health of the data center fabric for proactive operations.

C.

Use the digital sandbox to test and validate configuration changes and upgrades.

D.

Use a fabric intent to build and validate design templates.

Questions # 9:

Which of the following is NOT a valid logging source used in Nokia’s SR Linux?

Options:

A.

Linux facility + priority

B.

Console

C.

SR Linux subsystem + priority

D.

Syslog filter

Questions # 10:

Which of the following statements about the YANG model used in Nokia’s SR Linux is FALSE?

Options:

A.

All configuration and state information is defined as a YANG model.

B.

The YANG model uses a tree structure with “leafs” as the branches and “containers” as the data components.

C.

The YANG model can be converted into other formats such as JSON or XML.

D.

The YANG model provides a standardized way for applications to retrieve SR Linux configuration and state information.

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.