ExamGecko
Home / Juniper / JN0-664 / List of questions
Ask Question

Juniper JN0-664 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Exhibit

Juniper JN0-664 image Question 11 51078 09182024211332000000

CE-1 and CE-2 are part of a VPLS called Customer1 No connectivity exists between CE-1 and CE-2. In the process of troubleshooting, you notice PE-1 is not learning any routes for this VPLS from PE-2, and PE-2 is not learning any routes for this VPLS from PE-1.

The route target must match on PE-1 and PE-2.
The route target must match on PE-1 and PE-2.
The route distinguisher must match on PE-1 and PE-2.
The route distinguisher must match on PE-1 and PE-2.
The instance type should be changed to I2vpn.
The instance type should be changed to I2vpn.
The no-tunnel-services statement should be deleted on both PEs.
The no-tunnel-services statement should be deleted on both PEs.
Suggested answer: A
Explanation:

VPLS is a technology that provides Layer 2 VPN services over an MPLS network. VPLS uses BGP as its control protocol to exchange VPN membership information between PE routers. The route target is a BGP extended community attribute that identifies which VPN a route belongs to. The route target must match on PE routers that participate in the same VPLS instance, otherwise they will not accept or advertise routes for that VPLS.

asked 18/09/2024
Arvin Lee
42 questions

Question 12

Report Export Collapse

Exhibit

Juniper JN0-664 image Question 12 51079 09182024211332000000

Referring to the exhibit, CE-1 is providing NAT services for the hosts at Site 1 and you must provide Internet access for those hosts

Which two statements are correct in this scenario? (Choose two.)

You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-A.inet.0 table as the next hop
You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-A.inet.0 table as the next hop
You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-A.inet.0 table as the next hop.
You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-A.inet.0 table as the next hop.
You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-A.inet.0 table.
You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-A.inet.0 table.
You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-A.inet.0 table to the inet.0 table.
You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-A.inet.0 table to the inet.0 table.
Suggested answer: B, C
asked 18/09/2024
luis lozano
48 questions

Question 13

Report Export Collapse

Exhibit

Juniper JN0-664 image Question 13 51080 09182024211332000000

A network is using IS-IS for routing.

In this scenario, why are there two TLVs shown in the exhibit?

There are both narrow and wide metric devices in the topology
There are both narrow and wide metric devices in the topology
The interface specified a metric of 100 for L2.
The interface specified a metric of 100 for L2.
Wide metrics have specifically been requested
Wide metrics have specifically been requested
Both IPv4 and IPv6 are being used in the topology
Both IPv4 and IPv6 are being used in the topology
Suggested answer: A
Explanation:

TLVs are tuples of (Type, Length, Value) that can be advertised in IS-IS packets. TLVs can carry different kinds of information in the Link State Packets (LSPs). IS-IS supports both narrow and wide metrics for link costs. Narrow metrics use a single octet to encode the link cost, while wide metrics use three octets. Narrow metrics have a maximum value of 63, while wide metrics have a maximum value of 16777215. If there are both narrow and wide metric devices in the topology, IS-IS will advertise two TLVs for each link: one with the narrow metric and one with the wide metric.This allows backward compatibility with older devices that only support narrow metrics12.

asked 18/09/2024
Giorgio Bertocchi
46 questions

Question 14

Report Export Collapse

Exhibit

Juniper JN0-664 image Question 14 51081 09182024211332000000

You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number Which two steps will accomplish this task? (Choose two.)

Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
Configure the BGP group with the as-override parameter on R2 and R3
Configure the BGP group with the as-override parameter on R2 and R3
Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
Configure the BGP group with the as-override parameter on R1 and R4
Configure the BGP group with the as-override parameter on R1 and R4
Suggested answer: B, C
asked 18/09/2024
Arnaud Dutel
38 questions

Question 15

Report Export Collapse

By default, which statement is correct about OSPF summary LSAs?

All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
The area-range command must be installed on all routers.
The area-range command must be installed on all routers.
Type 3 LSAs are advertised for routes in Type 1 LSAs.
Type 3 LSAs are advertised for routes in Type 1 LSAs.
The metric associated with a summary route will be equal to the lowest metric associated with an individual contributing route
The metric associated with a summary route will be equal to the lowest metric associated with an individual contributing route
Suggested answer: C
Explanation:

OSPF uses different types of LSAs to describe different aspects of the network topology. Type 1 LSAs are also known as router LSAs, and they describe the links and interfaces of a router within an area. Type 3 LSAs are also known as summary LSAs, and they describe routes to networks outside an area but within the same autonomous system (AS). By default, OSPF will summarize routes from Type 1 LSAs into Type 3 LSAs when advertising them across area boundaries .

asked 18/09/2024
Thanh Phan
46 questions

Question 16

Report Export Collapse

Which statement is true regarding BGP FlowSpec?

It uses a remote triggered black hole to protect a network from a denial-of-service attack.
It uses a remote triggered black hole to protect a network from a denial-of-service attack.
It uses dynamically created routing policies to protect a network from denial-of-service attacks
It uses dynamically created routing policies to protect a network from denial-of-service attacks
It is used to protect a network from denial-of-service attacks dynamically
It is used to protect a network from denial-of-service attacks dynamically
It verifies that the source IP of the incoming packet has a resolvable route in the routing table
It verifies that the source IP of the incoming packet has a resolvable route in the routing table
Suggested answer: B
Explanation:

BGP FlowSpec is a feature that extends the Border Gateway Protocol (BGP) to enable routers to exchange traffic flow specifications, allowing for more precise control of network traffic. The BGP FlowSpec feature enables routers to advertise and receive information about specific flows in the network, such as those originating from a particular source or destined for a particular destination.Routers can then use this information to construct traffic filters that allow or deny packets of a certain type, rate limit flows, or perform other actions1.BGP FlowSpec can also help in filtering traffic and taking action against distributed denial of service (DDoS) attacks by dropping the DDoS traffic or diverting it to an analyzer2.BGP FlowSpec rules are internally converted to equivalent Cisco Common Classification Policy Language (C3PL) representing corresponding match and action parameters2. Therefore, BGP FlowSpec uses dynamically created routing policies to protect a network from denial-of-service attacks.

asked 18/09/2024
Taheireem Shaikh
33 questions

Question 17

Report Export Collapse

Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )

rewrite rules
rewrite rules
behavior aggregate classifiers
behavior aggregate classifiers
traffic shapers
traffic shapers
fixed classifiers
fixed classifiers
multifield classifiers
multifield classifiers
Suggested answer: B, D, E
Explanation:

Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:

Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.

Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.

Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters.

Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.

asked 18/09/2024
OKAN AYDOΓ„ΕΎAN
53 questions

Question 18

Report Export Collapse

Which origin code is preferred by BGP?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be processed when received on this interface?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Exhibit

Juniper JN0-664 image Question 20 51087 09182024211332000000

Referring to the exhibit, PIM-SM is configured on all routers, and Anycast-RP with Anycast-PIM is used for the discovery mechanism on RP1 and RP2. The interface metric values are shown for the OSPF area.

In this scenario, which two statements are correct about which RP is used? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 93 questions
Go to page: of 10

Related questions