Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-649 Questions and Answers

Question # 6

You are using 802.1X authentication in your network to secure all ports. You have a printer that does not support 802.1X and you must ensure that traffic is allowed to and from this printer without authentication.

In this scenario, what will satisfy the requirement?

A.

MAC filtering

B.

MACsec

C.

static MAC bypass

D.

MAC RADIUS

Full Access
Question # 7

You are asked to enforce user authentication using a captive portal before users access the corporate network.

Which statement is correct in this scenario?

A.

HTTPS is the default protocol for a captive portal.

B.

A captive portal can be bypassed using anallowlist command containing a device’s IP address.

C.

When enabled, a captive portal must be applied to each individual interface.

D.

All Web browser requests are redirected to the captive portal until authentication is successful.

Full Access
Question # 8

A Layer 2 connection does not expend across data centers. The IP subnet in a Layer 2 domain is confined within a single data center.

Which EVPN route type is used to communicate prefixes between the data centers?

A.

Type 1

B.

Type 2

C.

Type 4

D.

Type 5

Full Access
Question # 9

You are implementing the route summarization feature of OSPF.

Which two results do you achieve in this scenario? (Choose two.)

A.

It helps in migrating to future multi-area OSPF network designs.

B.

It reduced the routing table size, enabling devices to store and process lessinformation.

C.

It reduces the impact of topology changes on a device.

D.

It provides optimal routing in the network.

Full Access