Questions for the 4A0-D01 were updated on : Nov 21 ,2025
Based on the exhibit output, which of the following is NOT the reason the user runs the “baseline
diff” command?
A
Explanation:
The "baseline diff" command is used to compare the candidate configuration against the baseline
datastore to see changes or conflicts, especially when multiple users are involved or to verify
differences. It does not indicate that the user is unable to commit changes.
How are LLDP frames advertised between two Nokia SR Linux routers?
B
Explanation:
LLDP frames are periodically sent to a well-known multicast MAC address on each interface to
discover directly connected devices.
How does Nokia’s Fabric Services System use a fabric intent to build the DC switch fabric?
A
Explanation:
Nokia’s Fabric Services System uses a fabric intent defined in a declarative YAML file to specify the
desired state of the data center fabric, which is then used to build and configure the fabric
accordingly.
Which of the following is NOT part of Day 2+ operations with Nokia’s Fabric Services System?
D
Explanation:
Using a fabric intent to build and validate design templates is primarily a Day 0 or Day 1 activity
focused on initial fabric deployment and design, not part of Day 2+ operational tasks like monitoring,
health analysis, or change validation.
When autoboot flag is set in grub.cfg, which of the following is NOT performed as part of the Zero
Touch Provisioning (ZTP) autoboot process?
D
Explanation:
The ZTP autoboot process does not automatically use Nokia’s Fabric Services System to deploy the
digital sandbox; it focuses on network boot, DHCP IP assignment, and downloading/executing
provisioning scripts from web or FTP servers.
Which of the following statements about Zero Touch Provisioning (ZTP) is FALSE?
A
Explanation:
The ZTP process downloads a provisioning script typically from a defined URL or server, not from a
TLS profile. The TLS profile is used for securing communications but does not define the provisioning
script location.
Which of the following is NOT one of the user types supported in Nokia SR Linux?
D
Explanation:
Nokia SR Linux supports SR Linux users, regular Linux OS users, and container users. "Remote users"
is not a defined user type within SR Linux user management.
Based on the exhibit output, which of the following statements is TRUE?
B
Explanation:
The exhibit shows ICMP packets being captured and displayed by a tcpdump-like utility, which
indicates that a capture-filter is configured to copy ICMP packets to the Control Plane Manager
(CPM) where they are processed and monitored.
Which of the following statements about a CPM-filter policer is FALSE?
B
Explanation:
The system-cpu-policer in Nokia SR Linux is software-based, not hardware-based. It acts on aggregate
control plane traffic and supports hierarchical policing with CPM-filter entries using both distributed
and system-cpu-policers.
Which of the following Nokia’s SR Linux ACLs is instantiated on all line cards to copy incoming
packets to the CPM?
B
Explanation:
The CPM-filter ACL is instantiated on all line cards in Nokia’s SR Linux to copy incoming packets to the
Control Plane Manager (CPM) for processing.
Based on the exhibit output, what CLI command can be used to display the contents of “bgp-log” in
Nokia’s SR Linux?
B
Explanation:
The "bgp-log" is defined as a log file in the configuration, so the correct command to display its
contents is show system logging file bgp-log.
Which of the following is NOT a valid logging source used in Nokia’s SR Linux?
D
Explanation:
"Syslog filter" is not a logging source; it is a mechanism used to filter log messages. Valid logging
sources in SR Linux include Linux facility + priority, console, and SR Linux subsystem + priority.
Which of the following statements about Nokia’s SR Linux logging is FALSE?
B
Explanation:
Nokia SR Linux does not natively support saving logs locally as encrypted files. Logs are managed
using standard Linux syslog facilities and can be filtered, but encryption of local log files is not a built-
in feature.
Examine the exhibit. What type of information is NOT included in the IMET route advertised by
VTEP1?
C
Explanation:
The IMET route includes the VNI, flooding list, and IP address of the originating VTEP, but it does not
include the route distinguisher of the VTEP’s MAC-VRF.
Which of the following statements about multi-homing in EVPN is FALSE?
C
Explanation:
The Ethernet Segment Identifier (ESI) uniquely identifies an Ethernet Segment (ES) globally across
the EVPN domain, not just locally for a particular leaf.