ExamGecko
Home Home / Juniper / JN0-480

Juniper JN0-480 Practice Test - Questions Answers

Question list
Search
Search

In the Juniper Apstra Ul. you are creating a VNI pool for virtual networks.

In this scenario, which VNI range is acceptable?

A.
Any range is acceptable for the VNI pool.
A.
Any range is acceptable for the VNI pool.
Answers
B.
The valid VNI range is 4096 through 16777214.
B.
The valid VNI range is 4096 through 16777214.
Answers
C.
The valid VNI range is 2 through 4096.
C.
The valid VNI range is 2 through 4096.
Answers
D.
The valid VNI range is 1 through 10000.
D.
The valid VNI range is 1 through 10000.
Answers
Suggested answer: B

Explanation:

In the Juniper Apstra UI, you can create VNI pools for virtual networks that use VXLAN encapsulation in the overlay network. A VNI pool is a resource pool that contains a range of VNIs that can be assigned to the virtual networks.The valid VNI range for a VNI pool is 4096 through 16777214, according to the VXLAN standard1. Therefore, the statement B is correct in this scenario.

The following three statements are incorrect in this scenario:

Any range is acceptable for the VNI pool.This is not true, because the VNI range has a lower and upper limit defined by the VXLAN standard1. The lower limit is 4096, and the upper limit is 16777214. Any VNI outside this range is invalid and cannot be used for VXLAN encapsulation.

The valid VNI range is 2 through 4096. This is not true, because the VNI range does not start from 2, but from 4096.The VNIs from 2 to 4095 are reserved and cannot be used for VXLAN encapsulation1.

The valid VNI range is 1 through 10000.This is not true, because the VNI range does not include 1, which is also reserved and cannot be used for VXLAN encapsulation1.The VNI range also does not end at 10000, but at 16777214, which is the maximum possible value for a 24-bit VNI field1.

VNI Pools (Resources)

Exhibit.

Which two statements ate correct about the graph query output shown in the exhibit? (Choose two.)

A.
The interface has an IP address assigned to it.
A.
The interface has an IP address assigned to it.
Answers
B.
The output shows a LAG connection.
B.
The output shows a LAG connection.
Answers
C.
The switch in the output is a Juniper device.
C.
The switch in the output is a Juniper device.
Answers
D.
The interface has tags assigned to it.
D.
The interface has tags assigned to it.
Answers
Suggested answer: B, C

Explanation:

The graph query output shown in the exhibit is a JSON representation of an interface node and its properties in the Apstra graph database. Based on the output, we can infer the following statements:

The output shows a LAG connection.This is true because the interface node has a property calledlag_modewhich is set tolacp_active, indicating that the interface is part of a link aggregation group (LAG) that uses the Link Aggregation Control Protocol (LACP) to negotiate the link state and parameters12.

The switch in the output is a Juniper device.This is true because the interface node has a property calledif_namewhich is set toae2, indicating that the interface name follows the Juniper naming convention for aggregated Ethernet interfaces34.

The interface has an IP address assigned to it.This is false because the interface node has properties calledipv4_addrandipv6_addrwhich are both set tonull, indicating that the interface does not have any IPv4 or IPv6 address configured2.

The interface has tags assigned to it.This is false because the interface node has a property calledtagswhich is set tonull, indicating that the interface does not have any tags associated with it2.Reference:

Link Aggregation Overview

Processor: Generic Graph Collector

Understanding Aggregated Ethernet Interfaces and LACP

Graph

Which statement is correct about the Juniper Apstra Rendered configuration?

A.
It is built at commit time and stored in a MySQL database.
A.
It is built at commit time and stored in a MySQL database.
Answers
B.
It is stored in a NoSQL database and incrementally updated.
B.
It is stored in a NoSQL database and incrementally updated.
Answers
C.
It is dynamically tendered at commit time.
C.
It is dynamically tendered at commit time.
Answers
D.
It is rendered from the graph database and stored locally.
D.
It is rendered from the graph database and stored locally.
Answers
Suggested answer: C

Explanation:

The Juniper Apstra Rendered configuration is the configuration that is generated from the staged blueprint and applied to the devices in the network. The Rendered configuration is dynamically rendered at commit time, which means that it is created on the fly based on the latest changes and validations in the blueprint. The Rendered configuration is not stored in any database, but it can be viewed in the Apstra UI or downloaded as a file. The Rendered configuration reflects the desired state of the network as defined by the intent of the blueprint. The other options are incorrect because:

A) It is built at commit time and stored in a MySQL database is wrong because the Rendered configuration is not stored in any database, let alone a MySQL database. Apstra uses a graph database to store the network topology and configuration data, not a relational database like MySQL.

B) It is stored in a NoSQL database and incrementally updated is wrong because the Rendered configuration is not stored in any database, let alone a NoSQL database. Apstra uses a graph database to store the network topology and configuration data, not a non-relational database like NoSQL. The Rendered configuration is not incrementally updated, but dynamically rendered at commit time.

D) It is rendered from the graph database and stored locally is wrong because the Rendered configuration is not rendered from the graph database, but from the staged blueprint. The graph database stores the network topology and configuration data, but the Rendered configuration is generated from the blueprint, which is a logical representation of the network design and intent. The Rendered configuration is not stored locally, but it can be downloaded as a file if needed.Reference:

Config Rendering in Juniper Apstra

AOS Device Configuration Lifecycle

Configlets (Datacenter Design)

Multilenancy for applications is achieved by creating virtual networks (VNs) within which construct?

A.
security policy
A.
security policy
Answers
B.
routing table
B.
routing table
Answers
C.
connectivity template
C.
connectivity template
Answers
D.
routing zone
D.
routing zone
Answers
Suggested answer: D

Explanation:

According to the Juniper documentation1, a routing zone is an L3 domain, the unit of tenancy in multi-tenant networks. You create routing zones for tenants to isolate their IP traffic from one another, thus enabling tenants to re-use IP subnets. In addition to being in its own VRF, each routing zone can be assigned its own DHCP relay server and external system connections. You can create one or more virtual networks within a routing zone, which means a tenant can stretch its L2 applications across multiple racks within its routing zone. Therefore, the correct answer is D. routing zone. A routing zone is the construct within which you create virtual networks to achieve multitenancy for applications.Reference:Routing Zones

What does EVPN use lo identity which remote leaf device advertised the EVPN route?

A.
a route distinguisher value
A.
a route distinguisher value
Answers
B.
a community tag
B.
a community tag
Answers
C.
a route target value
C.
a route target value
Answers
D.
a VRF target value
D.
a VRF target value
Answers
Suggested answer: A

Explanation:

EVPN uses a route distinguisher (RD) value to identify which remote leaf device advertised the EVPN route. An RD is a 64-bit value that is prepended to the EVPN NLRI to create a unique VPNv4 or VPNv6 prefix. The RD value is usually derived from the IP address of the PE that originates the EVPN route. By comparing the RD values of different EVPN routes, a PE can determine which remote PE advertised the route and which VRF the route belongs to. The other options are incorrect because:

B) a community tag is wrong because a community tag is an optional transitive BGP attribute that can be used to group destinations that share some common properties. A community tag does not identify the source of the EVPN route.

C) a route target value is wrong because a route target (RT) value is an extended BGP community that is used to control the import and export of EVPN routes between VRFs. An RT value does not identify the source of the EVPN route.

D) a VRF target value is wrong because there is no such thing as a VRF target value in EVPN. A VRF is a virtual routing and forwarding instance that isolates the IP traffic of different VPNs on a PE. A VRF does not have a target value associated with it.Reference:

EVPN Fundamentals

RFC 9136 - IP Prefix Advertisement in Ethernet VPN (EVPN)

EVPN Type-5 Routes: IP Prefix Advertisement

Understanding EVPN Pure Type 5 Routes

Exhibit.

You connect two single-homed servers using Juniper Apstra as shown in the exhibit. You are using the ERB design blueprint with two virtual networks in a common routing zone.

In this scenario, which two types of VXLAN tunnels will be automatically created by the EVPN control plane? (Choose two.)

A.
EVPN signaled route Type-8 VXLAN tunnels
A.
EVPN signaled route Type-8 VXLAN tunnels
Answers
B.
EVPN signaled route Type-3 VXLAN tunnels
B.
EVPN signaled route Type-3 VXLAN tunnels
Answers
C.
EVPN signaled route Type-6 VXLAN tunnels
C.
EVPN signaled route Type-6 VXLAN tunnels
Answers
D.
EVPN signaled route Type-2 VXLAN tunnels
D.
EVPN signaled route Type-2 VXLAN tunnels
Answers
Suggested answer: B, D

Explanation:

According to the Juniper documentation1, EVPN route Type-3 is used to advertise the IP address of the VTEP and the VNIs that it supports. This allows the VTEPs to discover each other and form VXLAN tunnels for the VNIs that they have in common. EVPN route Type-2 is used to advertise the MAC and IP addresses of the hosts connected to the VTEPs. This allows the VTEPs to learn the MAC-to-IP bindings and the MAC-to-VTEP mappings for the hosts in the same VNI. Therefore, these two types of VXLAN tunnels will be automatically created by the EVPN control plane when using Juniper Apstra with the ERB design blueprint and two virtual networks in a common routing zone.Reference:Example: Configure an EVPN-VXLAN Centrally-Routed Bridging Fabric

In the Juniper Apstra design phase, which object dictates port count, port speed, and how the ports would be used?

A.
logical devices
A.
logical devices
Answers
B.
rack type
B.
rack type
Answers
C.
network devices
C.
network devices
Answers
D.
interface map
D.
interface map
Answers
Suggested answer: D

Explanation:

Interface maps are objects that map interfaces between logical devices and physical hardware devices in the Juniper Apstra design phase. They dictate port count, port speed, and how the ports would be used for achieving the intended network configuration rendering. Interface maps also allow you to select device ports, transformations, and interfaces, provision breakout ports, and disable unused ports. For more information, seeInterface Maps (Datacenter Design).Reference:

Interface Maps (Datacenter Design)

Design

Interface Maps Introduction

You want to keep virtual networks isolated from each other within the Juniper Apstra system.

In this scenario, what are three ways to accomplish this task? (Choose three.)

A.
Disable IPv4 connectivity when creating the virtual network within the same Routing Zone.
A.
Disable IPv4 connectivity when creating the virtual network within the same Routing Zone.
Answers
B.
Enable Security Policy for virtual networks in the same Routing Zone.
B.
Enable Security Policy for virtual networks in the same Routing Zone.
Answers
C.
Disable Route Target exports when creating the Routing Zones.
C.
Disable Route Target exports when creating the Routing Zones.
Answers
D.
Use Connectivity Templates to block access within the same Routing Zone.
D.
Use Connectivity Templates to block access within the same Routing Zone.
Answers
E.
Put each network in different Routing Zones.
E.
Put each network in different Routing Zones.
Answers
Suggested answer: B, D, E

Explanation:

To keep virtual networks isolated from each other within the Juniper Apstra system, you can use one or more of the following methods:

Enable Security Policy for virtual networks in the same Routing Zone.This allows you to define rules that control the traffic flow between different virtual networks within the same routing zone. You can specify the source and destination virtual networks, the protocol, the port, and the action (allow or deny) for each rule.The security policy is applied on the ingress interface of the leaf devices1.

Use Connectivity Templates to block access within the same Routing Zone.This allows you to customize the connectivity between different racks within the same routing zone. You can create templates that define the link type, the routing protocol, and the access control list (ACL) for each rack pair.The ACL can be used to filter the traffic based on the source and destination IP addresses, the protocol, and the port2.

Put each network in different Routing Zones.This allows you to create logical boundaries between different virtual networks based on the route target (RT) values. A routing zone is a collection of virtual networks that share the same RT for importing and exporting routes.Virtual networks in different routing zones do not exchange routes with each other, unless you configure remote EVPN gateways to connect them3.Reference:

Security Policy

Connectivity Templates

Routing Zones

Exhibit.

The 10.100.0.0/16 route is being advertised into your BGP IP fabric. ECMP load balancing has been properly enabled on all devices

In this scenario, how many routes will the leaf device in AS 65000 receive for the 10.100.0.0/16 prefix?

A.
3
A.
3
Answers
B.
1
B.
1
Answers
C.
2
C.
2
Answers
D.
4
D.
4
Answers
Suggested answer: A

Explanation:

The leaf device in AS 65000 will receive three routes for the 10.100.0.0/16 prefix, one from each spine device in AS 65001, AS 65002, and AS 65003. Since ECMP load balancing is enabled, the leaf device will install all three routes in its routing table and distribute the traffic among them. The other options are incorrect because:

B) 1 is wrong because the leaf device will not receive only one route for the prefix. It will receive multiple routes from different spine devices and use ECMP to load balance among them.

C) 2 is wrong because the leaf device will not receive only two routes for the prefix. It will receive three routes from three spine devices, as explained above.

D) 4 is wrong because the leaf device will not receive four routes for the prefix. It will receive three routes from three spine devices, as explained above. The fourth spine device in AS 65004 is not directly connected to the leaf device and will not advertise the prefix to it.Reference:

IP Fabric Underlay Network Design and Implementation

BGP Multipath load sharing iBGP and eBGP

ECMP Load Balancing

Using the Juniper Apstra multitenancy capabilities, which approach will allow a tenant to interconnect two different routing zones?

A.
Interconnection is the default behavior.
A.
Interconnection is the default behavior.
Answers
B.
Use interconnection through the fabric spine nodes.
B.
Use interconnection through the fabric spine nodes.
Answers
C.
Interconnection cannot be enabled.
C.
Interconnection cannot be enabled.
Answers
D.
Use interconnection through an external gateway.
D.
Use interconnection through an external gateway.
Answers
Suggested answer: D

Explanation:

According to the Juniper documentation1, a routing zone is an L3 domain, the unit of tenancy in multi-tenant networks. You create routing zones for tenants to isolate their IP traffic from one another, thus enabling tenants to re-use IP subnets. In addition to being in its own VRF, each routing zone can be assigned its own DHCP relay server and external system connections. You can create one or more virtual networks within a routing zone, which means a tenant can stretch its L2 applications across multiple racks within its routing zone. For virtual networks with Layer 3 SVI, the SVI is associated with a Virtual Routing and Forwarding (VRF) instance for each routing zone isolating the virtual network SVI from other virtual network SVIs in other routing zones. If you're using multiple routing zones, external system connections must be from leaf switches in the fabric. Routing between routing zones must be accomplished with external systems. Therefore, the correct answer is D. Use interconnection through an external gateway.Reference:Routing Zones

Total 65 questions
Go to page: of 7