Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Exhibit

You have MAC addresses moving in your EVPN environment

Referring to the exhibit, which two statements are correct about the sequence number? (Choose two)

A.

It identifies MAC addresses that should be discarded.

B.

It resolves conflicting MAC address ownership claims.

C.

It helps the local PE to identify the latest advertisement.

D.

It is advertised using a Type 2 message

Full Access
Question # 5

Your organization manages a Layer 3 VPN for multiple customers To support advanced route than one BGP community on advertised VPN routes to remote PE routers.

Which routing-instance configuration parameter would support this requirement?

A.

vrf-export

B.

vrf-import

C.

vrf-target export

D.

vrf-target import

Full Access
Question # 6

You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task?

A.

Configure the ignore-attached-bit parameter on all L2 routers.

B.

Configure all routers to allow wide metrics.

C.

Configure all routers to be L1.

D.

Configure the ignore-attached-bit parameter on all L1 routers

Full Access
Question # 7

Exhibit

Referring to the exhibit, CE-1 is providing NAT services for the hosts at Site 1 and you must provide Internet access for those hosts

Which two statements are correct in this scenario? (Choose two.)

A.

You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-A.inet.0 table as the next hop

B.

You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-A.inet.0 table as the next hop.

C.

You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-A.inet.0 table.

D.

You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-A.inet.0 table to the inet.0 table.

Full Access
Question # 8

Which statement is true regarding BGP FlowSpec?

A.

It uses a remote triggered black hole to protect a network from a denial-of-service attack.

B.

It uses dynamically created routing policies to protect a network from denial-of-service attacks

C.

It is used to protect a network from denial-of-service attacks dynamically

D.

It verifies that the source IP of the incoming packet has a resolvable route in the routing table

Full Access
Question # 9

Exhibit

Which two statements are true about the OSPF adjacency displayed in the exhibit? (Choose two.)

A.

There is a mismatch in the hello interval parameter between routers R1 and R2

B.

There is a mismatch in the dead interval parameter between routers R1 and R2.

C.

There is a mismatch in the OSPF hold timer parameter between routers R1 and R2.

D.

There is a mismatch in the poll interval parameter between routers R1 and R2.

Full Access
Question # 10

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

This route is learned through EBGP

B.

This is an EVPN Type-2 route.

C.

The device advertising this route into EVPN is 192.168.101.5.

D.

The devices advertising this route into EVPN are 10 0 2 12 and 10.0.2.22.

Full Access
Question # 11

Exhibit

You want to implement the BGP Generalized TTL Security Mechanism (GTSM) on the network

Which three statements are correct in this scenario? (Choose three)

A.

You can implement BGP GTSM between R2, R3, and R4

B.

BGP GTSM requires a firewall filter to discard packets with incorrect TTL.

C.

You can implement BGP GTSM between R2 and R1.

D.

BGP GTSM requires a TTL of 1 to be configured between neighbors.

E.

BGP GTSM requires a TTL of 255 to be configured between neighbors.

Full Access
Question # 12

After a recent power outage, your manager asks you to investigate ways to automatically reduce the impact caused by suboptimal routing in your OSPF and OSPFv3 network after devices reboot.

Which three configuration statements accomplish this task? (Choose three.)

A.

set protocols ospf3 realm ipv4-unicast overload timeout 900

B.

set protocols ospf overload

C.

set protocols ospf overload timeout 900

D.

set protocols ospf3 overload

E.

set protocols ospf3 overload timeout 900

Full Access
Question # 13

Exhibit

You are running a service provider network and must transport a customer's IPv6 traffic across your IPv4-based MPLS network using BGP You have already configured mpis ipv6-tunneling on your PE routers.

Which two statements are correct about the BGP configuration in this scenario? (Choose two.)

A.

You must configure family inet6 labcled-unicast between PE routers.

B.

You must configure family inet6 unicaat between PE and CE routers.

C.

You must configure family inet6 add-path between PE and CE routers.

D.

You must configure family inet6 unicast between PE routers

Full Access
Question # 14

In which two ways does OSPF prevent routing loops in multi-area networks? (Choose two.)

A.

All areas are required to connect as a full mesh.

B.

The LFA algorithm prunes all looped paths within an area.

C.

All areas are required to connect to area 0.

D.

The SPF algorithm prunes looped paths within an area.

Full Access
Question # 15

Which two statements are correct about VPLS tunnels? (Choose two.)

A.

LDP-signaled VPLS tunnels only support control bit 0.

B.

LDP-signaled VPLS tunnels use auto-discovery to provision sites

C.

BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.

D.

BGP-signaled VPLS tunnels require manual provisioning of sites.

Full Access
Question # 16

You are asked to protect your company's customers from amplification attacks. In this scenario, what is Juniper's recommended protection method?

A.

ASN prepending

B.

BGP FlowSpec

C.

destination-based Remote Triggered Black Hole

D.

unicast Reverse Path Forwarding

Full Access
Question # 17

Which two statements about IS-IS are correct? (Choose two.)

A.

CSNPs are flooded periodically.

B.

PSNPs are flooded periodically.

C.

PSNPs contain only descriptions of LSPs.

D.

CSNPs contain only descriptions of LSPs.

Full Access
Question # 18

Exhibit

You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number Which two steps will accomplish this task? (Choose two.)

A.

Configure the BGP group with the advertise-peer-as parameter on R1 and R4.

B.

Configure the BGP group with the as-override parameter on R2 and R3

C.

Configure the BGP group with the advertise-peer-as parameter on R2 and R3.

D.

Configure the BGP group with the as-override parameter on R1 and R4

Full Access
Question # 19

Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )

A.

rewrite rules

B.

behavior aggregate classifiers

C.

traffic shapers

D.

fixed classifiers

E.

multifield classifiers

Full Access
Question # 20

Exhibit

CE-1 must advertise ten subnets to PE-1 using BGP Once CE-1 starts advertising the subnets to PE-1, the BGP peering state changes to Active.

Referring to the CLI output shown in the exhibit, which statement is correct?

A.

CE-1 is advertising its entire routing table.

B.

CE-1 is configured with an incorrect peer AS

C.

The prefix limit has been reached on PE-1

D.

CE-1 is unreachable

Full Access
Question # 21

Which two statements are correct regarding bootstrap messages that are forwarded within a PIM sparse mode domain? (Choose two.)

A.

Bootstrap messages are forwarded only to routers that explicitly requested the messages within the PIM sparse-mode domain

B.

Bootstrap messages distribute RP information dynamically during an RP election.

C.

Bootstrap messages are used to notify which router is the PIM RP

D.

Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.

Full Access