ExamGecko
Home Home / Juniper / JN0-664

Juniper JN0-664 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Exhibit

Referring to the exhibit, a working L3VPN exists that connects VPN-A sites CoS is configured correctly to match on the MPLS EXP bits of the LSP, but when traffic is sent from Site-1 to Site-2, PE-2 is not classifying the traffic correctly

What should you do to solve the problem?

A.
Configure the explicit-null statement on PE-1.
A.
Configure the explicit-null statement on PE-1.
Answers
B.
Configure the explicit-null statement on PE-2
B.
Configure the explicit-null statement on PE-2
Answers
C.
Configure VPN prefix mapping for the PE-1_to_PE-2 LSP
C.
Configure VPN prefix mapping for the PE-1_to_PE-2 LSP
Answers
D.
Set a static CoS value for the PE-1_to_PE-2 LSP
D.
Set a static CoS value for the PE-1_to_PE-2 LSP
Answers
Suggested answer: A

Explanation:

The explicit-null statement enables the PE router to send an MPLS label with a value of 0 (explicit null) instead of an IP header for packets destined to the VPN customer sites. This allows the penultimate hop router (the router before the egress PE router) to preserve the EXP bits of the MPLS label and pass them to the egress PE router.The egress PE router can then use these EXP bits to classify the traffic according to the CoS policy2. In this example, PE-1 should configure the explicit-null statement under [edit protocols mpls label-switched-path PE-1_to_PE-2] hierarchy level.

Exhibit

You want to implement the BGP Generalized TTL Security Mechanism (GTSM) on the network

Which three statements are correct in this scenario? (Choose three)

A.
You can implement BGP GTSM between R2, R3, and R4
A.
You can implement BGP GTSM between R2, R3, and R4
Answers
B.
BGP GTSM requires a firewall filter to discard packets with incorrect TTL.
B.
BGP GTSM requires a firewall filter to discard packets with incorrect TTL.
Answers
C.
You can implement BGP GTSM between R2 and R1.
C.
You can implement BGP GTSM between R2 and R1.
Answers
D.
BGP GTSM requires a TTL of 1 to be configured between neighbors.
D.
BGP GTSM requires a TTL of 1 to be configured between neighbors.
Answers
E.
BGP GTSM requires a TTL of 255 to be configured between neighbors.
E.
BGP GTSM requires a TTL of 255 to be configured between neighbors.
Answers
Suggested answer: B, C, E

Explanation:

https://www.juniper.net/documentation/us/en/software/junos/bgp/topics/ref/statement/multihop-edit-protocols-bgp.html

Which two statements are correct about a sham link? (Choose two.)

A.
It creates an OSPF multihop neighborship between two PE routers.
A.
It creates an OSPF multihop neighborship between two PE routers.
Answers
B.
It creates a BGP multihop neighborship between two PE routers.
B.
It creates a BGP multihop neighborship between two PE routers.
Answers
C.
The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes
C.
The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes
Answers
D.
The PEs exchange Type 3 OSPF LSAs instead of Type 1 OSPF LSAs for the L3VPN routes.
D.
The PEs exchange Type 3 OSPF LSAs instead of Type 1 OSPF LSAs for the L3VPN routes.
Answers
Suggested answer: A, C

Explanation:

A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring an intra-area back door link over the VPN backbone. A sham link creates an OSPF multihop neighborship between the PE routers using TCP port 646.The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes, which allows OSPF to use the correct metric for route selection1.

Exhibit

R1 and R8 are not receiving each other's routes

Referring to the exhibit, what are three configuration commands that would solve this problem? (Choose three.)

A.
Configure loops and advertise-peer-as on routers in AS 64497 and AS 64450.
A.
Configure loops and advertise-peer-as on routers in AS 64497 and AS 64450.
Answers
B.
Configure loops on routers in AS 65412 and advertise-peer-as on routers in AS 64498.
B.
Configure loops on routers in AS 65412 and advertise-peer-as on routers in AS 64498.
Answers
C.
Configure as-override on advertisement from AS 64500 toward AS 64512.
C.
Configure as-override on advertisement from AS 64500 toward AS 64512.
Answers
D.
Configure remove-private on advertisements from AS 64497 toward AS 64498
D.
Configure remove-private on advertisements from AS 64497 toward AS 64498
Answers
E.
Configure remove-private on advertisements from AS 64500 toward AS 64499
E.
Configure remove-private on advertisements from AS 64500 toward AS 64499
Answers
Suggested answer: B, D, E

Explanation:

The problem in this scenario is that R1 and R8 are not receiving each other's routes because of private AS numbers in the AS path. Private AS numbers are not globally unique and are not advertised to external BGP peers. To solve this problem, you need to do the following:

Configure loops on routers in AS 65412 and advertise-peer-as on routers in AS 64498. This allows R5 and R6 to advertise their own AS number (65412) instead of their peer's AS number (64498) when sending updates to R7 and R8.This prevents a loop detection issue that would cause R7 and R8 to reject the routes from R5 and R62.

Configure remove-private on advertisements from AS 64497 toward AS 64498 and from AS 64500 toward AS 64499. This removes any private AS numbers from the AS path before sending updates to external BGP peers.This allows R2 and R3 to receive the routes from R1 and R4, respectively3.

You are a network architect for a service provider and want to offer Layer 2 services to your customers You want to use EVPN for Layer 2 services in your existing MPLS network.

Which two statements are correct in this scenario? (Choose two.)

A.
Segment routing must be configured on all PE routers.
A.
Segment routing must be configured on all PE routers.
Answers
B.
VXLAN must be configured on all PE routers.
B.
VXLAN must be configured on all PE routers.
Answers
C.
EVPN uses Type 2 routes to advertise MAC address and IP address pairs learned using ARP snooping
C.
EVPN uses Type 2 routes to advertise MAC address and IP address pairs learned using ARP snooping
Answers
D.
EVPN uses Type 3 routes to join a multicast tree to flood traffic.
D.
EVPN uses Type 3 routes to join a multicast tree to flood traffic.
Answers
Suggested answer: C, D

Explanation:

EVPN is a technology that connects L2 network segments separated by an L3 network using a virtual Layer 2 network overlay over the Layer 3 network. EVPN uses BGP as its control protocol to exchange different types of routes for different purposes. Type 2 routes are used to advertise MAC address and IP address pairs learned using ARP snooping from the local CE devices. Type 3 routes are used to join a multicast tree to flood traffic such as broadcast, unknown unicast, and multicast (BUM) traffic.

After a recent power outage, your manager asks you to investigate ways to automatically reduce the impact caused by suboptimal routing in your OSPF and OSPFv3 network after devices reboot.

Which three configuration statements accomplish this task? (Choose three.)

A.
set protocols ospf3 realm ipv4-unicast overload timeout 900
A.
set protocols ospf3 realm ipv4-unicast overload timeout 900
Answers
B.
set protocols ospf overload
B.
set protocols ospf overload
Answers
C.
set protocols ospf overload timeout 900
C.
set protocols ospf overload timeout 900
Answers
D.
set protocols ospf3 overload
D.
set protocols ospf3 overload
Answers
E.
set protocols ospf3 overload timeout 900
E.
set protocols ospf3 overload timeout 900
Answers
Suggested answer: A, C, E

Explanation:

To reduce the impact of suboptimal routing in OSPF and OSPFv3 after devices reboot, you can use the overload feature to prevent a router from being used as a transit router for a specified period of time. This allows the router to stabilize its routing table before forwarding traffic for other routers. To enable the overload feature, you need to do the following:

For OSPF, configure the overload statement under [edit protocols ospf] hierarchy level. You can also specify a timeout value in seconds to indicate how long the router should remain in overload state after it boots up. For example, set protocols ospf overload timeout 900 means that the router will be in overload state for 15 minutes after it boots up.

For OSPFv3, configure the overload statement under [edit protocols ospf3] hierarchy level. You can also specify a realm (ipv4-unicast or ipv6-unicast) and a timeout value in seconds to indicate how long the router should remain in overload state after it boots up for each realm. For example, set protocols ospf3 realm ipv4-unicast overload timeout 900 means that the router will be in overload state for 15 minutes after it boots up for IPv4 unicast routing.

Exhibit

You are running a service provider network and must transport a customer's IPv6 traffic across your IPv4-based MPLS network using BGP You have already configured mpis ipv6-tunneling on your PE routers.

Which two statements are correct about the BGP configuration in this scenario? (Choose two.)

A.
You must configure family inet6 labcled-unicast between PE routers.
A.
You must configure family inet6 labcled-unicast between PE routers.
Answers
B.
You must configure family inet6 unicaat between PE and CE routers.
B.
You must configure family inet6 unicaat between PE and CE routers.
Answers
C.
You must configure family inet6 add-path between PE and CE routers.
C.
You must configure family inet6 add-path between PE and CE routers.
Answers
D.
You must configure family inet6 unicast between PE routers
D.
You must configure family inet6 unicast between PE routers
Answers
Suggested answer: A, B

Explanation:

To transport IPv6 traffic over an IPv4-based MPLS network using BGP, you need to configure two address families: family inet6 labeled-unicast and family inet6 unicast. The former is used to exchange IPv6 routes with MPLS labels between PE routers, and the latter is used to exchange IPv6 routes without labels between PE and CE routers. The mpis ipv6-tunneling command enables the PE routers to encapsulate the IPv6 packets with an MPLS label stack and an IPv4 header before sending them over the MPLS network.

You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task?

A.
Configure the ignore-attached-bit parameter on all L2 routers.
A.
Configure the ignore-attached-bit parameter on all L2 routers.
Answers
B.
Configure all routers to allow wide metrics.
B.
Configure all routers to allow wide metrics.
Answers
C.
Configure all routers to be L1.
C.
Configure all routers to be L1.
Answers
D.
Configure the ignore-attached-bit parameter on all L1 routers
D.
Configure the ignore-attached-bit parameter on all L1 routers
Answers
Suggested answer: D

Explanation:

The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1 routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their routing tables.

Your organization manages a Layer 3 VPN for multiple customers To support advanced route than one BGP community on advertised VPN routes to remote PE routers.

Which routing-instance configuration parameter would support this requirement?

A.
vrf-export
A.
vrf-export
Answers
B.
vrf-import
B.
vrf-import
Answers
C.
vrf-target export
C.
vrf-target export
Answers
D.
vrf-target import
D.
vrf-target import
Answers
Suggested answer: C

Explanation:

The vrf-target export parameter is used to specify one or more BGP extended community attributes that are attached to VPN routes when they are exported from a VRF routing instance to remote PE routers. This parameter allows you to control which VPN routes are accepted by remote PE routers based on their import policies. You can specify more than one vrf-target export value for a VRF routing instance to support advanced route filtering or route leaking scenarios.

Exhibit

A network designer would like to create a summary route as shown in the exhibit, but the configuration is not working.

Which three configuration changes will create a summary route? (Choose three.)

A.
set policy-options policy-statement leak-v6 term DC-routes then reject
A.
set policy-options policy-statement leak-v6 term DC-routes then reject
Answers
B.
delete policy-options policy-statement leak-v6 term DC-routes from route-filter 2001: db9 :a: fa00 : :/6l longer
B.
delete policy-options policy-statement leak-v6 term DC-routes from route-filter 2001: db9 :a: fa00 : :/6l longer
Answers
C.
set policy---options policy-statement leak-v term DC---routes from route-filter 2001:db9:a:faOO::/61 exact
C.
set policy---options policy-statement leak-v term DC---routes from route-filter 2001:db9:a:faOO::/61 exact
Answers
D.
delete protocols isis export summary-v6
D.
delete protocols isis export summary-v6
Answers
E.
set protocols isis import summary-v6
E.
set protocols isis import summary-v6
Answers
Suggested answer: B, C, D

Explanation:

To create a summary route for IS-IS, you need to configure a policy statement that matches the prefixes to be summarized and sets the next-hop to discard. You also need to configure a summary-address statement under the IS-IS protocol hierarchy that references the policy statement. In this case, the policy statement leak-v6 is trying to match the prefix 2001:db9:a:fa00::/61 exactly, but this prefix is not advertised by any router in the network. Therefore, no summary route is created. To fix this, you need to delete the longer keyword from the route-filter term and change the prefix length to /61 exact. This will match any prefix that falls within the /61 range. You also need to delete the export statement under protocols isis, because this will export all routes that match the policy statement to other IS-IS routers, which is not desired for a summary route.

Total 93 questions
Go to page: of 10