Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Juniper JN0-280 Dumps

Page: 1 / 7
Total 65 questions

Data Center, Associate (JNCIA-DC) Questions and Answers

Question 1

Leaf and spine data centers are used to better accommodate which type of traffic?

Options:

A.

north-east

B.

east-west

C.

north-west

D.

south-east

Question 2

Exhibit:

as

Referring to the exhibit, which next hop will be preferred in the routing table?

Options:

A.

Next hop IP address 172.25.20.254 will be preferred.

B.

Neither next hop will be preferred.

C.

Next hop IP address 172.25.20.200 will be preferred.

D.

Both next hops will be preferred.

Question 3

Which three actions are required to implement filter-based forwarding? (Choose three.)

Options:

A.

You must create an instance-type forwarding routing instance.

B.

You must create an instance-type vrf routing instance.

C.

You must create a match filter.

D.

You must create a security policy.

E.

You must create a RIB group.

Question 4

A routing policy has been created to advertise OSPF routes in BGP. Which statement is correct in this scenario?

Options:

A.

Apply the policy as an export policy within BGP.

B.

Apply the policy as an export policy within OSPF.

C.

Apply the policy as an import policy within BGP.

D.

Apply the policy as an import policy within OSPF.

Question 5

How does OSPF calculate the best path to a particular prefix?

Options:

A.

It finds the path with the numerically lowest cost.

B.

It finds the path with the shortest autonomous system path.

C.

It finds the path with the least number of hops.

D.

It finds the path with the numerically lowest route preference.

Question 6

What is the definition of a trunk interface on a switch?

Options:

A.

An interface that carries multiple VLANs.

B.

An interface that carries high bandwidth.

C.

An interface that connects directly to powerful servers.

D.

An interface that carries excess traffic.

Question 7

MACsec provides protection against which two types of threats? (Choose two.)

Options:

A.

Data decryption

B.

Playback attacks

C.

Hashing attacks

D.

Man-in-the-middle attack

Question 8

In the Junos OS, which feature is used to create an alternate next hop with a unique preference for a static route?

Options:

A.

Preference

B.

Resolve

C.

Next-hop

D.

Qualified-next-hop

Question 9

Layer 2 interfaces operate in which two modes? (Choose two.)

Options:

A.

Access

B.

Modular

C.

Trunk

D.

Tagged

Question 10

Exhibit:

as

Referring to the exhibit, which statement is correct?

Options:

A.

The configuration will commit successfully and BGP group 1 will operate as IBGP.

B.

The configuration will commit successfully and BGP group 1 will operate as EBGP.

C.

BGP group 1 requires a type external parameter.

D.

BGP group 1 requires a type internal parameter.

Question 11

What are three correct layer names used in legacy hierarchical network design? (Choose three.)

Options:

A.

Access layer

B.

Modular layer

C.

Aggregation layer

D.

Core layer

E.

Function layer

Question 12

Which statement is correct about a three-stage IP fabric underlay?

Options:

A.

Every ingress interface into the fabric is only two hops away from the egress interface.

B.

Every spine device can communicate directly with other spine devices.

C.

Every leaf device can communicate directly with other leaf devices.

D.

Every server that connects to a three-stage IP fabric must be multihomed.

Question 13

Exhibit:

as

Referring to the exhibit, which behavior does this configuration enable on the ge-0/0/1.0 interface?

Options:

A.

This configuration enables a MAC address learned on the interface to be persistently retained in the Ethernet-switching table, even after a reboot.

B.

This configuration enables the device to place a MAC address that persistently causes network errors into a special protected VLAN.

C.

This configuration enables the device to shut down the interface when a particular MAC address persistently sends broadcast traffic.

D.

This configuration enables the interface to learn and remember MAC addresses, until the device is rebooted.

Question 14

as

Referring to the exhibit, why are the BGP routes hidden?

Options:

A.

Load balancing is not enabled.

B.

There are too many hops to the destination.

C.

The BGP next hop is unreachable.

D.

Other routes are selected because of better metrics.

Question 15

You want to minimize topology disruptions in your network when the rpd process restarts on a device. Which service would accomplish this task?

Options:

A.

Bidirectional Forwarding Detection (BFD)

B.

link aggregation groups

C.

graceful restart (GR)

D.

Virtual Chassis

Question 16

Which statement is correct about areas in OSPF?

Options:

A.

An OSPF area is used to segment Layer 2 broadcast domains.

B.

OSPF areas are used to isolate the effects of a broadcast storm.

C.

OSPF areas are used to reduce the size of the link-state database.

D.

An OSPF area is used to signify the autonomous system to which each device belongs.

Question 17

Exhibit:

as

How many stages are shown in the exhibit?

Options:

A.

2

B.

5

C.

6

D.

3

Question 18

Which two statements are correct about EVPN-VXLAN overlay networking? (Choose two.)

Options:

A.

It is the only option to provide reachability between servers that reside in the same network segment in a data center.

B.

BGP provides the control plane within the overlay network.

C.

An encapsulation of the original packet is required to transport the packet across the network.

D.

OSPF provides the control plane within the overlay network.

Question 19

What is the main purpose of Bidirectional Forwarding Detection (BFD)?

Options:

A.

to detect network path failures

B.

to determine if the forwarding routes are correct

C.

to detect the forwarding protocol

D.

to determine packet round-trip latency

Page: 1 / 7
Total 65 questions