ExamGecko
Home Home / Juniper / JN0-351

Juniper JN0-351 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











You want to use filter-based forwarding (FBF) on your Internet peering router to load-balance traffic to two directly connected ISPs based on the source address.

Which two statements are correct in this scenario? (Choose two.)

A.
FBF uses the no-forwarding routing instance type.
A.
FBF uses the no-forwarding routing instance type.
Answers
B.
FBF uses the forwarding routing instance type.
B.
FBF uses the forwarding routing instance type.
Answers
C.
RIB groups are used to copy routes from the inet. o routing table.
C.
RIB groups are used to copy routes from the inet. o routing table.
Answers
D.
RIB groups are used to hide routes in the inet. 0 routing table.
D.
RIB groups are used to hide routes in the inet. 0 routing table.
Answers
Suggested answer: B, C

Explanation:

Option B is correct.Filter-based forwarding (FBF), also known as Policy Based Routing (PBR), uses the forwarding routing instance type12.

Option C is correct.Routing Information Base (RIB) groups are used to copy routes from one routing table to another34.In the context of FBF, RIB groups can be used to copy routes from the inet.0 routing table34.

Option A is incorrect.FBF does not use the no-forwarding routing instance type15.

Option D is incorrect.RIB groups are not used to hide routes in the inet.0 routing table34.They are used to share or copy routes between different routing tables34.

You want to ensure traffic is routed through a GRE tunnel.

In this scenario, which two statements will satisfy this requirement? (Choose two.)

A.
Tunnel endpoints must have a route that directs traffic into the tunnel.
A.
Tunnel endpoints must have a route that directs traffic into the tunnel.
Answers
B.
All intermediary devices must have a route to the tunnel endpoints.
B.
All intermediary devices must have a route to the tunnel endpoints.
Answers
C.
Keepalives must be used on stateless tunneling protocols.
C.
Keepalives must be used on stateless tunneling protocols.
Answers
D.
BFD must be used on the stateless tunneling protocols.
D.
BFD must be used on the stateless tunneling protocols.
Answers
Suggested answer: A, B

Explanation:

Option A is correct. For traffic to be sent through a GRE tunnel, there must be a route that directs the traffic into the tunnel. This is typically accomplished through the use of a static route or a dynamic routing protocol.

Option B is correct. All intermediary devices must have a route to the tunnel endpoints34. In real-world scenarios, the tunnel endpoints for a tunnel going over the Internet must have globally reachable internet addresses. Otherwise, intermediate routers in the Internet cannot forward the tunneled packets.

Exhibit

You are troubleshooting an issue where traffic to 192.168.10.0/24 is being sent to R1 instead of your desired path through R2.

Referring to the exhibit, what is the reason for the problem?

A.
R2's route is not the best path due to loop prevention.
A.
R2's route is not the best path due to loop prevention.
Answers
B.
R2's route is not the best path due to a lower origin code.
B.
R2's route is not the best path due to a lower origin code.
Answers
C.
R1's route is the best path due to a higher local preference
C.
R1's route is the best path due to a higher local preference
Answers
D.
R1's route is the best path due to the shorter AS path.
D.
R1's route is the best path due to the shorter AS path.
Answers
Suggested answer: C

Explanation:

The exhibit shows the output of the commandshow ip bgp, which displays information about the BGP routes in the routing table1. The output shows two routes for the destination 192.168.10.0/24, one from R1 and one from R2.

The route from R1 has a local preference of 200, while the route from R2 has a local preference of 100.Local preference is a BGP attribute that indicates the degree of preference for a route within an autonomous system (AS)2.A higher local preference means a more preferred route2.

BGP uses a best path selection algorithm to choose the best route for each destination among multiple paths.The algorithm compares different attributes of the routes in a specific order of precedence3.The first attribute that is compared is weight, which is a Cisco-specific attribute that is local to the router3.If the weight is equal or not set, the next attribute that is compared is local preference3.

In this case, both routes have the same weight of 0, which means that they are learned from external BGP (eBGP) peers3. Therefore, the next attribute that is compared is local preference.Since R1's route has a higher local preference than R2's route, it is chosen as the best path and installed in the routing table3. The other attributes, such as origin code and AS path, are not considered in this case.

Which statement is correct about the storm control feature?

A.
The storm control feature is enabled in the factory-default configuration on EX Series switches.
A.
The storm control feature is enabled in the factory-default configuration on EX Series switches.
Answers
B.
The storm control feature requires a special license on EX Series switches.
B.
The storm control feature requires a special license on EX Series switches.
Answers
C.
The storm control feature is not supported on aggregate Ethernet interfaces.
C.
The storm control feature is not supported on aggregate Ethernet interfaces.
Answers
D.
The storm control configuration only applies to traffic being sent between the forwarding and control plane.
D.
The storm control configuration only applies to traffic being sent between the forwarding and control plane.
Answers
Suggested answer: A

Explanation:

Option A is correct.The storm control feature is enabled in the factory-default configuration on EX Series switches12.On EX2200, EX3200, EX3300, EX4200, and EX6200 switches, the factory default configuration enables storm control for broadcast and unknown unicast traffic on all switch interfaces2.On EX4300 switches, the factory default configuration enables storm control on all Layer 2 switch interfaces1.

Option B is incorrect.The storm control feature does not require a special license on EX Series switches34.

Option C is incorrect. There's no information available that suggests the storm control feature is not supported on aggregate Ethernet interfaces.

Option D is incorrect.The storm control configuration applies to traffic at the ingress of an interface5, not just between the forwarding and control plane.

After receiving a BGP route, which two conditions are verified by the receiving router to ensure that the received route is valid? (Choose two)

A.
The AS-path length is greater than 0.
A.
The AS-path length is greater than 0.
Answers
B.
The loops do not exist.
B.
The loops do not exist.
Answers
C.
The next hop is reachable.
C.
The next hop is reachable.
Answers
D.
The local preference is greater than 0.
D.
The local preference is greater than 0.
Answers
Suggested answer: B, C

Explanation:

Bis correct because the loops do not exist is one of the conditions that are verified by the receiving router to ensure that the received BGP route is valid.A loop in BGP means that a route has been advertised by the same AS more than once, which can cause routing instability and inefficiency1.To prevent loops, BGP uses the AS-path attribute, which lists the AS numbers that a route has traversed from the origin to the destination2.The receiving router checks the AS-path attribute of the received route and discards it if it finds its own AS number in the list2. This way, BGP avoids accepting routes that contain loops.

Cis correct because the next hop is reachable is one of the conditions that are verified by the receiving router to ensure that the received BGP route is valid.The next hop is the IP address of the next router that is used to forward packets to the destination network3.The receiving router checks the next hop attribute of the received route and verifies that it has a valid route to reach it3.If the next hop is not reachable, the received route is not usable and is rejected by the receiving router3. This way, BGP ensures that only feasible routes are accepted.

What are two reasons for creating multiple areas in OSPF? (Choose two.)

A.
to reduce the convergence time
A.
to reduce the convergence time
Answers
B.
to increase the number of adjacencies in the backbone
B.
to increase the number of adjacencies in the backbone
Answers
C.
to increase the size of the LSDB
C.
to increase the size of the LSDB
Answers
D.
to reduce LSA flooding across the network
D.
to reduce LSA flooding across the network
Answers
Suggested answer: A, D

Explanation:

Option A is correct. Creating multiple areas in OSPF can help to reduce the convergence time . This is because changes in one area do not affect other areas, so fewer routers need to run the SPF algorithm in response to a change.

Option D is correct. Creating multiple areas in OSPF can help to reduce Link State Advertisement (LSA) flooding across the network. This is because LSAs are not flooded out of their area of origin.

Which two events cause a router to advertise a connected network to OSPF neighbors? (Choose two.)

A.
When an OSPF adjacency is established.
A.
When an OSPF adjacency is established.
Answers
B.
When an interface has the OSPF passive option enabled.
B.
When an interface has the OSPF passive option enabled.
Answers
C.
When a static route to the 224.0.0.6 address is created.
C.
When a static route to the 224.0.0.6 address is created.
Answers
D.
When a static route to the 224.0.0.5 address is created.
D.
When a static route to the 224.0.0.5 address is created.
Answers
Suggested answer: A, D

Explanation:

Ais correct because when an OSPF adjacency is established, a router will advertise a connected network to OSPF neighbors.An OSPF adjacency is a logical relationship between two routers that agree to exchange routing information using the OSPF protocol1.To establish an OSPF adjacency, the routers must be in the same area, have compatible parameters, and exchange hello packets1.Once an OSPF adjacency is formed, the routers will exchange database description (DBD) packets, which contain summaries of their link-state databases (LSDBs)1.The LSDBs include information about the connected networks and their costs2. Therefore, when an OSPF adjacency is established, a router will advertise a connected network to OSPF neighbors through DBD packets.

Dis correct because when a static route to the 224.0.0.5 address is created, a router will advertise a connected network to OSPF neighbors.The 224.0.0.5 address is the multicast address for all OSPF routers3.A static route to this address can be used to send OSPF hello packets to all OSPF neighbors on a network segment3.This can be useful when the network segment does not support multicast or when the router does not have an IP address on the segment3.When a static route to the 224.0.0.5 address is created, the router will send hello packets to this address and establish OSPF adjacencies with other routers on the segment3. As explained above, once an OSPF adjacency is formed, the router will advertise a connected network to OSPF neighbors through DBD packets.

You are an operator for a network running 1S-IS. Two routers are failing to form an adjacency. What are two reasons for this problem? (Choose two.)

A.
There are mismatched router IDs on the L2 routers.
A.
There are mismatched router IDs on the L2 routers.
Answers
B.
There is no configured ISO address on any IS-IS interface.
B.
There is no configured ISO address on any IS-IS interface.
Answers
C.
There is a mismatched area ID between the L2 routers.
C.
There is a mismatched area ID between the L2 routers.
Answers
D.
The family iso configuration is missing from the adjacency interface.
D.
The family iso configuration is missing from the adjacency interface.
Answers
Suggested answer: B, D

Explanation:

The two reasons for the failure to form an adjacency in a network running IS-IS could be:

B) There is no configured ISO address on any IS-IS interface.IS-IS requires each router interface to have an ISO address configured.Without this address, the routers cannot form an adjacency1.

D) The family iso configuration is missing from the adjacency interface.The 'family iso' configuration is essential for IS-IS to function correctly.If this configuration is missing from the adjacency interface, it could prevent the formation of an adjacency1.

These explanations are based on the Enterprise Routing and Switching Specialist (JNCIS-ENT) documents and learning resources available at Juniper Networks23.

You have DHCP snooping enabled but no entries are automatically created in the snooping database for an interface on your EX Series switch. What are two reasons for the problem? (Choose two.)

A.
The device that is connected to the interface has performed a DHCPRELEASE.
A.
The device that is connected to the interface has performed a DHCPRELEASE.
Answers
B.
MAC limiting is enabled on the interface.
B.
MAC limiting is enabled on the interface.
Answers
C.
The device that is connected to the interface has a static IP address.
C.
The device that is connected to the interface has a static IP address.
Answers
D.
Dynamic ARP inspection is enabled on the interface.
D.
Dynamic ARP inspection is enabled on the interface.
Answers
Suggested answer: B, C

Explanation:

The DHCP snooping feature in Juniper Networks' EX Series switches works by building a binding database that maps the IP address, MAC address, lease time, binding type, VLAN number, and interface information1.This database is used to filter and validate DHCP messages from untrusted sources1.

However, there are certain conditions that could prevent entries from being automatically created in the snooping database for an interface:

MAC limiting: If MAC limiting is enabled on the interface, it could potentially interfere with the operation of DHCP snooping.MAC limiting restricts the number of MAC addresses that can be learned on a physical interface to prevent MAC flooding attacks1. This could inadvertently limit the number of DHCP clients that can be learned on an interface, thus preventing new entries from being added to the DHCP snooping database.

Static IP address: If the device connected to the interface is configured with a static IP address, it will not go through the DHCP process and therefore will not have an entry in the DHCP snooping database1.The DHCP snooping feature relies on monitoring DHCP messages to build its database1, so devices with static IP addresses that do not send DHCP messages will not have their information added.

Therefore, options B and C are correct.Options A and D are not correct because performing a DHCPRELEASE would simply remove an existing entry from the database1, and Dynamic ARP inspection (DAI) uses the information stored in the DHCP snooping binding database but does not prevent entries from being created1.

You implemented the MAC address limit feature with the shutdown action on all interfaces on your switch.

In this scenario, which statement is correct when a violation occurs?

A.
By default, you must manually clear the violation for the interface to send and receive traffic again.
A.
By default, you must manually clear the violation for the interface to send and receive traffic again.
Answers
B.
By default, the violation will automatically be cleared after 300 seconds and the interface will resume sending and receiving traffic for all learned devices.
B.
By default, the violation will automatically be cleared after 300 seconds and the interface will resume sending and receiving traffic for all learned devices.
Answers
C.
By default, devices that are learned before the violation occurs are still allowed to send and receive traffic through the specific interface.
C.
By default, devices that are learned before the violation occurs are still allowed to send and receive traffic through the specific interface.
Answers
D.
By default, the interface will continue to send and receive traffic for all connected devices after a violation has occurred.
D.
By default, the interface will continue to send and receive traffic for all connected devices after a violation has occurred.
Answers
Suggested answer: A

Explanation:

When the MAC address limit feature with the shutdown action is implemented on a switch, if a violation occurs, the interface is disabled and a system log entry is generated1.If the switch has been configured with the port-error-disable statement, the disabled interface recovers automatically upon expiration of the specified disable timeout1.However, if the switch has not been configured for auto-recovery from port error disabled conditions, you must manually clear the violation by running the clear ethernet-switching port-error command for the interface to send and receive traffic again1.This explanation is based on the Enterprise Routing and Switching Specialist (JNCIS-ENT) documents and learning resources available at Juniper Networks1.

Total 65 questions
Go to page: of 7