Juniper JN0-280 Practice Test - Questions Answers, Page 5
List of questions
Related questions
Which two statements are correct about VLAN tags? (Choose two.)
VLAN tags carry a VLAN ID and priority.
VLAN tags are required on access ports.
VLAN tags require multiple forwarding tables.
VLAN tags can be inserted or removed by trunk interfaces.
Exhibit:
Referring to the exhibit, at which interval will the interface be considered down if no hello packets are received?
2000 seconds
400 milliseconds
400 seconds
2000 milliseconds
In the Junos OS, which feature is used to create an alternate next hop with a unique preference for a static route?
Preference
Resolve
Next-hop
Qualified-next-hop
Exhibit:
Referring to the exhibit, which statement is correct?
The configuration will commit successfully and BGP group 1 will operate as IBGP.
The configuration will commit successfully and BGP group 1 will operate as EBGP.
BGP group 1 requires a type external parameter.
BGP group 1 requires a type internal parameter.
Which statement is correct about areas in OSPF?
An OSPF area is used to segment Layer 2 broadcast domains.
OSPF areas are used to isolate the effects of a broadcast storm.
OSPF areas are used to reduce the size of the link-state database.
An OSPF area is used to signify the autonomous system to which each device belongs.
What are two reasons why you would deploy an IP fabric instead of a traditional Layer 2 network in a data center? (Choose two.)
Layer 2 networks only support a single broadcast domain.
IP fabrics are better suited to smaller networks where scale is less important.
Layer 3 networks support load balancing.
Layer 2 networks are susceptible to loops.
Which two statements are correct about EVPN-VXLAN overlay networking? (Choose two.)
It is the only option to provide reachability between servers that reside in the same network segment in a data center.
BGP provides the control plane within the overlay network.
An encapsulation of the original packet is required to transport the packet across the network.
OSPF provides the control plane within the overlay network.
A generated route is configured under which hierarchy?
[edit policy-options]
[edit routing-instance]
[edit routing-options]
[edit protocols]
MACsec provides protection against which two types of threats? (Choose two.)
Data decryption
Playback attacks
Hashing attacks
Man-in-the-middle attack
Exhibit:
Referring to the exhibit, which next hop will be preferred in the routing table?
Next hop IP address 172.25.20.254 will be preferred.
Neither next hop will be preferred.
Next hop IP address 172.25.20.200 will be preferred.
Both next hops will be preferred.
Question