Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > JNCIS-ENT > JN0-351

JN0-351 Enterprise Routing and Switching Specialist (JNCIS-ENT) Question and Answers

Question # 4

You are configuring an IS-IS IGP network and do not see the IS-IS adjacencies established. In this scenario, what are two reasons for this problem? (Choose two.)

A.

MTU is not at least 1492 bytes.

B.

IP subnets are not a /30 address.

C.

The Level 2 routers have mismatched areas.

D.

The lo0 interface is not included as an IS-IS interface.

Full Access
Question # 5

Click the Exhibit button.

You want to redistribute the static routes into BGP, but they do not show as BGP routes.

What causes this result to occur?

A.

The static routes do not have a valid next hop.

B.

The as-path parameter must be specified.

C.

A community string must be configured.

D.

The no-readvertise feature is specified.

Full Access
Question # 6

Your network has two ISPs available. You want to ensure that all outbound traffic is routed out ISP-1. If the connection to ISP-1 fails, all outbound traffic is routed to the backup ISP ISP-2. In this scenario, how should you configure BGP on your network?

A.

Set the local-preference attribute to a higher value tor ISP-2 than ISP-1.

B.

Set the local-preference attribute to a higher value for ISP-1 than ISP-2.

C.

Configure the gateway for ISP-1 with a higher peer ID than the gateway for ISP-2.

D.

Configure the gateway for ISP-1 with a higher origin code than the gateway for ISP-2.

Full Access
Question # 7

You want to ensure traffic is routed through a GRE tunnel.

In this scenario, which two statements will satisfy this requirement? (Choose two.)

A.

Tunnel endpoints must have a route that directs traffic into the tunnel.

B.

All intermediary devices must have a route to the tunnel endpoints.

C.

Keepalives must be used on stateless tunneling protocols.

D.

BFD must be used on the stateless tunneling protocols.

Full Access
Question # 8

After receiving a BGP route, which two conditions are verified by the receiving router to ensure that the received route is valid? (Choose two)

A.

The AS-path length is greater than 0.

B.

The loops do not exist.

C.

The next hop is reachable.

D.

The local preference is greater than 0.

Full Access
Question # 9

Which statement is correct about the IS-IS ISO NET address?

A.

An ISO NET address defined with a system ID of 0000.0000.0000 must be selected as the DIS.

B.

An ISO NET address must be unique for each device in the network.

C.

You can only define a single ISO NET address per device.

D.

The Area ID must match on all devices within a L2 area.

Full Access
Question # 10

Referring to the exhibit, which three statements are correct? (Choose three.)

A.

The IP source guard is enabled.

B.

Dynamic ARP inspection is enabled.

C.

DHCP snooping is enabled.

D.

The DHCP snooping database is protected.

E.

DHCP snooping is enabled for IPv6 traffic.

Full Access
Question # 11

Click the Exhibit button.

R1 was started at 4:00 PM. R2 and R3 were started at 6:00 PM. R4 was started at 10:00 PM. All routers are in Area 0 and there are no point-to-point links.

Referring to the exhibit, which router is the designated router?

A.

R4

B.

R1

C.

R2

D.

R3

Full Access
Question # 12

Which two statements about redundant trunk groups on EX Series switches are correct? (Choose two.)

A.

Redundant trunk groups load-balance traffic across two designated uplink interfaces.

B.

If the active link fails, then the secondary link automatically takes over.

C.

Layer 2 control traffic is permitted on the secondary link

D.

Redundant trunk groups must be connected to the same aggregation switch.

Full Access
Question # 13

You are combining two existing interfaces into a single LAG interface, but you do not see the LAG interface being created.

Which two actions are required to solve this problem? (Choose two.)

A.

Ensure that the first LAG interface name is ae0.

B.

Ensure that the first LAG interface name is ae1.

C.

Ensure that LAG is enabled on each member interface.

D.

Ensure that LAG is enabled on the chassis.

Full Access
Question # 14

Two routers share the same highest priority and start time.

A.

In this situation, what is evaluated next when determining the designated router? The router with the lowest router ID become the DR.

B.

The router with the highest router ID becomes the DR

C.

The routers perform another DR election.

D.

The router with the highest MAC address become the DR

Full Access
Question # 15

You are asked to connect an IP phone and a user computer using the same interface on an EX Series switch. The traffic from the computer does not use a VLAN tag, whereas the traffic from the IP phone uses a VLAN tag.

Which feature enables the interface to receive both types of traffic?

A.

native VLAN

B.

DHCP snooping

C.

MAC limiting

D.

voice VLAN

Full Access
Question # 16

Which two mechanisms are part of building and maintaining a Layer 2 bridge table? (Choose two.)

A.

blocking

B.

flooding

C.

learning

D.

listening

Full Access
Question # 17

Which two statements correctly describe RSTP port roles? (Choose two.)

A.

The designated port forwards data to the downstream network segment or device.

B.

The backup port is used as a backup for the root port.

C.

The alternate port is a standby port for an edge port.

D.

The root port is responsible for forwarding data to the root bridge.

Full Access
Question # 18

Exhibit.

What is the management IP address of the device shown in the exhibit?

A.

10.210.20.233

B.

172.23.12.100

C.

128.0.0.1

D.

172.23.11.10

Full Access
Question # 19

Exhibit

You are receiving the BGP route shown in the exhibit from four different upstream ISPs.

Referring to the exhibit, which ISP will be selected as the active path?

A.

ISP1

B.

ISP 3

C.

ISP 4

D.

ISP 2

Full Access
Question # 20

Which two statements are correct about IS-IS? (Choose two.)

A.

IS-IS uses IPv6 as its transport protocol in the Junos OS Implementation.

B.

IS-IS has two metric types and Junos sends both by default.

C.

IS-IS sends a maximum metric value of 63 by default.

D.

IS-IS only allows you to configure two areas.

Full Access
Question # 21

You are asked to explore adding BGP route reflectors to allow for increased scale in your core network. Which statement is correct in this scenario?

A.

Route reflectors are required whenever internal BGP (IBGP) sessions are needed.

B.

The cluster ID is required to prevent routing loops.

C.

Route reflectors require that the network is connected in a physical full mesh.

D.

The cluster ID is not required to use route reflectors.

Full Access
Question # 22

A host is connected to your EX Series switch using an interface with persistent MAC learning enabled. When you connect the host to another interface on the same switch, all traffic generated by the host is dropped.

Which action should you perform to solve the problem?

A.

Disable dynamic ARP inspection.

B.

Enter the clear Ethernet switching table persistent learning command.

C.

Enter the clear dhcp snooping database command.

D.

Configure the Interface as a trunk port.

Full Access
Question # 23

Exhibit

Referring to the exhibit, which statement is correct?

A.

The local device is using a bridge priority of 4k.

B.

The root bridge is using a bridge priority of 4k.

C.

The root bridge has not been elected for this RSTP topology.

D.

The local device is the root bridge for this RSTP topology.

Full Access
Question # 24

Which statement is correct about IP-IP tunnels?

A.

IP-IP tunnels only support encapsulating IP traffic.

B.

IP-IP tunnels only support encapsulating non-IP traffic.

C.

The TTL in the inner packet is decremented during transit to the tunnel endpoint.

D.

There are 24 bytes of overhead with IP-IP encapsulation.

Full Access
Question # 25

Exhibit

Which command displays the output shown in the exhibit?

A.

show route forwarding-table

B.

show ethernet-switching table

C.

show ethernet—switching table extensive

D.

show route forwarding—table family ethernet-switching

Full Access
Question # 26

You have deployed a Juniper EX Series switch in the network. The switch receives a unicast frame destined to a MAC address that is not registered in the bridging table.

Which statement describes the behavior of the switch?

A.

The frame is flooded out all ports in all VLANs configured on the switch.

B.

The frame is flooded out all ports that are part of the same VLAN, except the receiving port.

C.

The switch performs an ARP request to discover the MAC address of the destination host.

D.

The switch sends an error message to the sender declaring that the host is unreachable.

Full Access
Question # 27

Which statement is correct about GRE tunnels?

A.

GRE tunnels only support encapsulating IP traffic.

B.

The time-to-live field in the tunnel payload is decremented during transit.

C.

There are 20 bytes of overhead with GRE encapsulation.

D.

GRE tunnels only support encapsulating non-IP traffic.

Full Access
Question # 28

What does the MAC limiting feature do on EX Series switches?

A.

It limits the number of MAC addresses learned on an access port.

B.

It limits the number of MAC addresses learned on a trunk port.

C.

It limits the acceptable values for a MAC address to a specified range.

D.

It limits the time a learned MAC address stays in the MAC routing table.

Full Access
Question # 29

Exhibit.

Which router will become the OSPF BDR if all routers are powered on at the same time?

A.

R4

B.

R1

C.

R3

D.

R2

Full Access
Question # 30

Exhibit

You have configured a GRE tunnel. To reduce the risk of dropping traffic, you have configured a keepalive OAM probe to monitor the state of the tunnel; however, traffic drops are still occurring.

Referring to the exhibit, what is the problem?

A.

For GRE tunnels, the OAM protocol requires that the BFD protocols also be used.

B.

The " event link-adjacency-loss " option must be set.

C.

LLDP needs to be removed from the gr-1/1/10.1 interface.

D.

The hold-time value must be two times the keepalive-time value

Full Access
Question # 31

Which three statements are correct about OSPF packet types? (Choose three.)

A.

Link-state request packets are sent after receiving an LSA header not in the OSPF database.

B.

Link-state acknowledgment packets are sent every 30 seconds.

C.

Hello packets are sent every 30 seconds by default.

D.

Database description packets are used during the adjacency formation process.

E.

Link-state update packets contain one or more LSAs.

Full Access
Question # 32

Which statement about aggregate routes is correct?

A.

Aggregate routes can only be used for static routing but not for dynamic routing protocols.

B.

Aggregate routes are automatically generated for all of the subnets in a routing table.

C.

Aggregate routes are always preferred over more specific routes, even when the specific routes have a better path.

D.

Aggregate routes are used for advertising summarized network prefixes.

Full Access