ExamGecko
Home Home / Juniper / JN0-664

Juniper JN0-664 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Exhibit

CE-1 and CE-2 are part of a VPLS called Customer1 No connectivity exists between CE-1 and CE-2. In the process of troubleshooting, you notice PE-1 is not learning any routes for this VPLS from PE-2, and PE-2 is not learning any routes for this VPLS from PE-1.

A.
The route target must match on PE-1 and PE-2.
A.
The route target must match on PE-1 and PE-2.
Answers
B.
The route distinguisher must match on PE-1 and PE-2.
B.
The route distinguisher must match on PE-1 and PE-2.
Answers
C.
The instance type should be changed to I2vpn.
C.
The instance type should be changed to I2vpn.
Answers
D.
The no-tunnel-services statement should be deleted on both PEs.
D.
The no-tunnel-services statement should be deleted on both PEs.
Answers
Suggested answer: A

Explanation:

VPLS is a technology that provides Layer 2 VPN services over an MPLS network. VPLS uses BGP as its control protocol to exchange VPN membership information between PE routers. The route target is a BGP extended community attribute that identifies which VPN a route belongs to. The route target must match on PE routers that participate in the same VPLS instance, otherwise they will not accept or advertise routes for that VPLS.

Exhibit

Referring to the exhibit, CE-1 is providing NAT services for the hosts at Site 1 and you must provide Internet access for those hosts

Which two statements are correct in this scenario? (Choose two.)

A.
You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-A.inet.0 table as the next hop
A.
You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-A.inet.0 table as the next hop
Answers
B.
You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-A.inet.0 table as the next hop.
B.
You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-A.inet.0 table as the next hop.
Answers
C.
You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-A.inet.0 table.
C.
You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-A.inet.0 table.
Answers
D.
You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-A.inet.0 table to the inet.0 table.
D.
You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-A.inet.0 table to the inet.0 table.
Answers
Suggested answer: B, C

Exhibit

A network is using IS-IS for routing.

In this scenario, why are there two TLVs shown in the exhibit?

A.
There are both narrow and wide metric devices in the topology
A.
There are both narrow and wide metric devices in the topology
Answers
B.
The interface specified a metric of 100 for L2.
B.
The interface specified a metric of 100 for L2.
Answers
C.
Wide metrics have specifically been requested
C.
Wide metrics have specifically been requested
Answers
D.
Both IPv4 and IPv6 are being used in the topology
D.
Both IPv4 and IPv6 are being used in the topology
Answers
Suggested answer: A

Explanation:

TLVs are tuples of (Type, Length, Value) that can be advertised in IS-IS packets. TLVs can carry different kinds of information in the Link State Packets (LSPs). IS-IS supports both narrow and wide metrics for link costs. Narrow metrics use a single octet to encode the link cost, while wide metrics use three octets. Narrow metrics have a maximum value of 63, while wide metrics have a maximum value of 16777215. If there are both narrow and wide metric devices in the topology, IS-IS will advertise two TLVs for each link: one with the narrow metric and one with the wide metric.This allows backward compatibility with older devices that only support narrow metrics12.

Exhibit

You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number Which two steps will accomplish this task? (Choose two.)

A.
Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
A.
Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
Answers
B.
Configure the BGP group with the as-override parameter on R2 and R3
B.
Configure the BGP group with the as-override parameter on R2 and R3
Answers
C.
Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
C.
Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
Answers
D.
Configure the BGP group with the as-override parameter on R1 and R4
D.
Configure the BGP group with the as-override parameter on R1 and R4
Answers
Suggested answer: B, C

By default, which statement is correct about OSPF summary LSAs?

A.
All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
A.
All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
Answers
B.
The area-range command must be installed on all routers.
B.
The area-range command must be installed on all routers.
Answers
C.
Type 3 LSAs are advertised for routes in Type 1 LSAs.
C.
Type 3 LSAs are advertised for routes in Type 1 LSAs.
Answers
D.
The metric associated with a summary route will be equal to the lowest metric associated with an individual contributing route
D.
The metric associated with a summary route will be equal to the lowest metric associated with an individual contributing route
Answers
Suggested answer: C

Explanation:

OSPF uses different types of LSAs to describe different aspects of the network topology. Type 1 LSAs are also known as router LSAs, and they describe the links and interfaces of a router within an area. Type 3 LSAs are also known as summary LSAs, and they describe routes to networks outside an area but within the same autonomous system (AS). By default, OSPF will summarize routes from Type 1 LSAs into Type 3 LSAs when advertising them across area boundaries .

Which statement is true regarding BGP FlowSpec?

A.
It uses a remote triggered black hole to protect a network from a denial-of-service attack.
A.
It uses a remote triggered black hole to protect a network from a denial-of-service attack.
Answers
B.
It uses dynamically created routing policies to protect a network from denial-of-service attacks
B.
It uses dynamically created routing policies to protect a network from denial-of-service attacks
Answers
C.
It is used to protect a network from denial-of-service attacks dynamically
C.
It is used to protect a network from denial-of-service attacks dynamically
Answers
D.
It verifies that the source IP of the incoming packet has a resolvable route in the routing table
D.
It verifies that the source IP of the incoming packet has a resolvable route in the routing table
Answers
Suggested answer: B

Explanation:

BGP FlowSpec is a feature that extends the Border Gateway Protocol (BGP) to enable routers to exchange traffic flow specifications, allowing for more precise control of network traffic. The BGP FlowSpec feature enables routers to advertise and receive information about specific flows in the network, such as those originating from a particular source or destined for a particular destination.Routers can then use this information to construct traffic filters that allow or deny packets of a certain type, rate limit flows, or perform other actions1.BGP FlowSpec can also help in filtering traffic and taking action against distributed denial of service (DDoS) attacks by dropping the DDoS traffic or diverting it to an analyzer2.BGP FlowSpec rules are internally converted to equivalent Cisco Common Classification Policy Language (C3PL) representing corresponding match and action parameters2. Therefore, BGP FlowSpec uses dynamically created routing policies to protect a network from denial-of-service attacks.

Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )

A.
rewrite rules
A.
rewrite rules
Answers
B.
behavior aggregate classifiers
B.
behavior aggregate classifiers
Answers
C.
traffic shapers
C.
traffic shapers
Answers
D.
fixed classifiers
D.
fixed classifiers
Answers
E.
multifield classifiers
E.
multifield classifiers
Answers
Suggested answer: B, D, E

Explanation:

Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:

Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.

Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.

Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters.

Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.

Which origin code is preferred by BGP?

A.
Internal
A.
Internal
Answers
B.
External
B.
External
Answers
C.
Incomplete
C.
Incomplete
Answers
D.
Null
D.
Null
Answers
Suggested answer: C

Explanation:

BGP uses several attributes to select the best path for a destination prefix. One of these attributes is origin, which indicates how BGP learned about a route. The origin attribute can have one of three values: IGP, EGP, or Incomplete. IGP means that the route was originated by a network or aggregate statement within BGP or by redistribution from an IGP into BGP. EGP means that the route was learned from an external BGP peer (this value is obsolete since BGP version 4). Incomplete means that the route was learned by some other means, such as redistribution from a static route into BGP. BGP prefers routes with lower origin values, so Incomplete is preferred over EGP, which is preferred over IGP.

An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be processed when received on this interface?

A.
The packet will be discarded.
A.
The packet will be discarded.
Answers
B.
The packet will be processed by the BA classifier first, then the MF classifier.
B.
The packet will be processed by the BA classifier first, then the MF classifier.
Answers
C.
The packet will be forwarded with no classification changes.
C.
The packet will be forwarded with no classification changes.
Answers
D.
The packet will be processed by the MF classifier first, then the BA classifier.
D.
The packet will be processed by the MF classifier first, then the BA classifier.
Answers
Suggested answer: C

Explanation:

behavior aggregate (BA) classifiers and multifield (MF) classifiers are two types of classifiers that are used to assign packets to a forwarding class and a loss priority based on different criteria. The forwarding class determines the output queue for a packet. The loss priority is used by a scheduler to control packet discard during periods of congestion.

A BA classifier maps packets to a forwarding class and a loss priority based on a fixed-length field in the packet header, such as DSCP, IP precedence, MPLS EXP, or IEEE 802.1p CoS bits. A BA classifier is computationally efficient and suitable for core devices that handle high traffic volumes. A BA classifier is useful if the traffic comes from a trusted source and the CoS value in the packet header is trusted.

An MF classifier maps packets to a forwarding class and a loss priority based on multiple fields in the packet header, such as source address, destination address, protocol type, port number, or VLAN ID. An MF classifier is more flexible and granular than a BA classifier and can match packets based on complex filter rules. An MF classifier is suitable for edge devices that need to classify traffic from untrusted sources or rewrite packet headers.

You can configure both a BA classifier and an MF classifier on an interface. If you do this, the BA classification is performed first and then the MF classification. If the two classification results conflict, the MF classification result overrides the BA classification result.

Based on this information, we can infer the following statements:

The packet will be discarded. This is not correct because the packet will not be discarded by the classifiers unless it matches a filter rule that specifies discard as an action. The classifiers only assign packets to a forwarding class and a loss priority based on their match criteria.

The packet will be processed by the BA classifier first, then the MF classifier. This is correct because if both a BA classifier and an MF classifier are configured on an interface, the BA classification is performed first and then the MF classification. If they conflict, the MF classification result overrides the BA classification result.

The packet will be forwarded with no classification changes. This is not correct because the packet will be classified by both the BA classifier and the MF classifier if they are configured on an interface. The final classification result will determine which output queue and which discard policy will be applied to the packet.

The packet will be processed by the MF classifier first, then the BA classifier. This is not correct because if both a BA classifier and an MF classifier are configured on an interface, the BA classification is performed first and then the MF classification. If they conflict, the MF classification result overrides the BA classification result.

Exhibit

Referring to the exhibit, PIM-SM is configured on all routers, and Anycast-RP with Anycast-PIM is used for the discovery mechanism on RP1 and RP2. The interface metric values are shown for the OSPF area.

In this scenario, which two statements are correct about which RP is used? (Choose two.)

A.
Source2 will use RP2 and Received will use RP2 for group 224.2.2.2.
A.
Source2 will use RP2 and Received will use RP2 for group 224.2.2.2.
Answers
B.
Source2 will use RP1 and Receiver2 will use RP1 for group 224.2.2.2.
B.
Source2 will use RP1 and Receiver2 will use RP1 for group 224.2.2.2.
Answers
C.
Source1 will use RP1 and Receiver1 will use RP1 for group 224.1.1.1.
C.
Source1 will use RP1 and Receiver1 will use RP1 for group 224.1.1.1.
Answers
D.
Source1 will use RP1 and Receiver1 will use RP2 for group 224.1 1 1
D.
Source1 will use RP1 and Receiver1 will use RP2 for group 224.1 1 1
Answers
Suggested answer: A, C

Explanation:

A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring an intra-area back door link over the VPN backbone. A sham link creates an OSPF multihop neighborship between the PE routers using TCP port 646.The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes, which allows OSPF to use the correct metric for route selection1.

Total 93 questions
Go to page: of 10