Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Juniper JN0-664 Dumps

Page: 1 / 5
Total 72 questions

Service Provider Routing and Switching - Professional (JNCIP-SP) Questions and Answers

Question 1

A packet is received on an interface configured with transmission scheduling. One of the configured queues In this scenario, which two actions will be taken by default on a Junos device? (Choose two.)

Options:

A.

The excess traffic will be discarded

B.

The exceeding queue will be considered to have negative bandwidth credit.

C.

The excess traffic will use bandwidth available from other queueses

D.

The exceeding queue will be considered to have positive bandwidth credit

Question 2

Exhibit

You are attempting to summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500. You implement the export policy shown in the exhibit and all routes from the routing table stop being advertised.

In this scenario, which two steps would you take to summarize the route in BGP? (Choose two.)

Options:

A.

Remove the from protocol bgp command from the export policy.

B.

Add the set protocols bgp family inet unicast add-path command to allow additional routes to the RIB tables. -

C.

Add the set routing-options static route 203.0.113.123/25 discard command.

D.

Replace exact in the export policy with orlonger.

Question 3

Exhibit

You are running a service provider network and must transport a customer's IPv6 traffic across your IPv4-based MPLS network using BGP You have already configured mpis ipv6-tunneling on your PE routers.

Which two statements are correct about the BGP configuration in this scenario? (Choose two.)

Options:

A.

You must configure family inet6 labcled-unicast between PE routers.

B.

You must configure family inet6 unicaat between PE and CE routers.

C.

You must configure family inet6 add-path between PE and CE routers.

D.

You must configure family inet6 unicast between PE routers

Question 4

Exhibit

A network designer would like to create a summary route as shown in the exhibit, but the configuration is not working.

Which three configuration changes will create a summary route? (Choose three.)

Options:

A.

set policy-options policy-statement leak-v6 term DC-routes then reject

B.

delete policy-options policy-statement leak-v6 term DC-routes from route-filter 2001: db9 :a: fa00 : :/6l longer

C.

set policy—options policy-statement leak-v€ term DC—routes from route-filter 2001:db9:a:faOO::/61 exact

D.

delete protocols isis export summary-v6

E.

set protocols isis import summary-v6

Question 5

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

This route is learned through EBGP

B.

This is an EVPN Type-2 route.

C.

The device advertising this route into EVPN is 192.168.101.5.

D.

The devices advertising this route into EVPN are 10 0 2 12 and 10.0.2.22.

Question 6

Exhibit 

R2 is receiving the same route from R1 and R3. You must ensure that you can load balance traffic for that route.

Referring to the exhibit, which configuration change will allow load balancing?

Options:

A.

Configure the multipath parameter under the global BGP configuration.

B.

Apply the prepend policy as an import policy under group R1.

C.

Configure the multipath multiple-as parameter under the global BGP configuration.

D.

Apply the prepend policy as an import policy under group R3.

Question 7

Exhibit

Referring to the exhibit, PE-1 and PE-2 are getting route updates for VPN-B when neither of them service that VPN

Which two actions would optimize this process? (Choose two.)

Options:

A.

Configure the resolution rib bgp.l3vpn.0 resolution-ribs inet.0 statement on the PEs.

B.

Configure the family route-target statement on the RR.

C.

Configure the resolution rib bgp.l3vpn.0 resolution-ribs inet.0 statement on the RR.

D.

Configure the family route-target statement on the PEs.

Question 8

You are asked to protect your company's customers from amplification attacks. In this scenario, what is Juniper's recommended protection method?

Options:

A.

ASN prepending

B.

BGP FlowSpec

C.

destination-based Remote Triggered Black Hole

D.

unicast Reverse Path Forwarding

Question 9

In IS-IS, which two statements are correct about the designated intermediate system (DIS) on a multi-access network segment? (Choose two)

Options:

A.

A router with a priority of 10 wins the DIS election over a router with a priority of 1.

B.

A router with a priority of 1 wins the DIS election over a router with a priority of 10.

C.

On the multi-access network, each router forms an adjacency to every other router on the segment

D.

On the multi-access network, each router only forms an adjacency to the DIS.

Question 10

Which statement is correct about IS-IS when it performs the Dijkstra algorithm?

Options:

A.

The local router moves its own local tuples into the candidate database

B.

When a new neighbor ID in the tree database matches a router ID in the LSDB, the neighbor ID is moved to the candidate database

C.

Tuples with the lowest cost are moved from the tree database to the LSDB.

D.

The algorithm will stop processing once the tree database is empty.

Question 11

Exhibit

You want Site 1 to access three VLANs that are located in Site 2 and Site 3 The customer-facing interface on the PE-1 router is configured for Ethernet-VLAN encapsulation.

What is the minimum number of L2VPN routing instances to be configured to accomplish this task?

Options:

A.

1

B.

3

C.

2

D.

6

Question 12

By default, which statement is correct about OSPF summary LSAs?

Options:

A.

All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA

B.

The area-range command must be installed on all routers.

C.

Type 3 LSAs are advertised for routes in Type 1 LSAs.

D.

The metric associated with a summary route will be equal to the lowest metric associated with an individual contributing route

Question 13

Exhibit

You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number Which two steps will accomplish this task? (Choose two.)

Options:

A.

Configure the BGP group with the advertise-peer-as parameter on R1 and R4.

B.

Configure the BGP group with the as-override parameter on R2 and R3

C.

Configure the BGP group with the advertise-peer-as parameter on R2 and R3.

D.

Configure the BGP group with the as-override parameter on R1 and R4

Question 14

Which two statements describe PIM-SM? (Choose two)

Options:

A.

Routers with receivers send join messages to their upstream neighbors.

B.

Routers without receivers must periodically prune themselves from the SPT.

C.

Traffic is initially flooded to all routers and an S,G is maintained for each group

D.

Traffic is only forwarded to routers that request to join the distribution tree.

Question 15

Your organization manages a Layer 3 VPN for multiple customers To support advanced route than one BGP community on advertised VPN routes to remote PE routers.

Which routing-instance configuration parameter would support this requirement?

Options:

A.

vrf-export

B.

vrf-import

C.

vrf-target export

D.

vrf-target import

Question 16

Exhibit

Referring to the exhibit, what do the brackets [ ] in the AS path identify?

Options:

A.

They identify the local AS number associated with the AS path if configured on the router, or if AS path prepending is configured

B.

They identify an AS set, which are groups of AS numbers in which the order does not matter

C.

They identify that the autonomous system number is incomplete and awaiting more information from the BGP protocol.

D.

They identify that a BGP confederation is being used to ensure that there are no routing loops.

Question 17

Which statement is true regarding BGP FlowSpec?

Options:

A.

It uses a remote triggered black hole to protect a network from a denial-of-service attack.

B.

It uses dynamically created routing policies to protect a network from denial-of-service attacks

C.

It is used to protect a network from denial-of-service attacks dynamically

D.

It verifies that the source IP of the incoming packet has a resolvable route in the routing table

Question 18

Exhibit

You want to use both links between R1 and R2 Because of the bandwidth difference between the two links, you must ensure that the links are used as much as possible.

Which action will accomplish this goal?

Options:

A.

Define a policy to tag routes with the appropriate bandwidth community.

B.

Disable multipath.

C.

Ensure that the metric-out parameter on the Gigabit Ethernet interface is higher than the 10 Gigibit Ethernet interface.

D.

Enable per-prefix load balancing.

Question 19

Exhibit

Referring to the exhibit, a working L3VPN exists that connects VPN-A sites CoS is configured correctly to match on the MPLS EXP bits of the LSP, but when traffic is sent from Site-1 to Site-2, PE-2 is not classifying the traffic correctly

What should you do to solve the problem?

Options:

A.

Configure the explicit-null statement on PE-1.

B.

Configure the explicit-null statement on PE-2

C.

Configure VPN prefix mapping for the PE-1_to_PE-2 LSP

D.

Set a static CoS value for the PE-1_to_PE-2 LSP

Question 20

Exhibit

Referring to the exhibit, you must provide Internet access for VPN-A using CE-1 as the hub CE.

Which two statements are correct in this situation? (Choose two.)

Options:

A.

You must use RIB groups to leak routes between the inet. o and vpn-a. inet. o tables.

B.

RIB groups are not needed to leak routes between the inet. 0 and VPN—A. inet. 0 tables,

C.

Internet traffic from Site 2 takes the path of PE-2 -> PE-1 -> GW-1.

D.

Internet traffic from Site 2 takes the path of PE-2 -> PE-1 -> CE-1 -> PE-1 -> GW-1.

Question 21

In which two ways does OSPF prevent routing loops in multi-area networks? (Choose two.)

Options:

A.

All areas are required to connect as a full mesh.

B.

The LFA algorithm prunes all looped paths within an area.

C.

All areas are required to connect to area 0.

D.

The SPF algorithm prunes looped paths within an area.

Page: 1 / 5
Total 72 questions