Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Juniper JN0-649 Dumps

Page: 1 / 7
Total 65 questions

Enterprise Routing and Switching Professional (JNCIP-ENT) Questions and Answers

Question 1

Your organization has recently acquired another company. You must carry all of the company’s existing VLANs across the corporate backbone to the existing branch locations without changing addressing and with minimal configuration.

Which technology will accomplish this task?

Options:

A.

Q-in-Q all-in-one bundling

B.

PVLAN isolated VLAN

C.

MVRP registration normal

D.

EVPN-VXLAN anycast gateway

Question 2

When using wide metrics, which two statements about route advertisement between IS-IS levels are correct? (Choose two.)

Options:

A.

Level 1 and Level 2 routers do not advertise Level 2 routes into the Level 1 area by default.

B.

Level 1 routes are advertised to Level 2 routers by default.

C.

If wide-metrics-only is configured, Level 1 routes are not advertised to Level 2 routers by default.

D.

Level 1 routes advertised as external routes into Level 1 are not advertised to any Level 2 routers by default.

Question 3

You are asked to establish interface level authentication for users connecting to your network. You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability.

Which authentication method would satisfy this requirement?

Options:

A.

MAC RADIUS

B.

captive portal

C.

802.1X with single-secure supplicant mode

D.

802.1X with multiple supplicant mode

Question 4

You are using 802.1X authentication in your network to secure all ports. You have a printer that does not support 802.1X and you must ensure that traffic is allowed to and from this printer without authentication.

In this scenario, what will satisfy the requirement?

Options:

A.

MAC filtering

B.

MACsec

C.

static MAC bypass

D.

MAC RADIUS

Question 5

Which three statements are correct about EVPN route types? (Choose three.)

Options:

A.

Type 3 routes carry replication information.

B.

Type 2 routes carry endpoint MAC address information.

C.

Type 2 routes carry endpoint IP address information.

D.

Type 5 routes carry replication information.

E.

Type 1 routes carry endpoint MAC address information.

Question 6

You have scheduled maintenance operations for one of the devices in your OSPF network.

Referring to the exhibit, which three statements are correct? (Choose three.)

as

Options:

A.

R1 does not participate in OSPF routing.

B.

Any traffic destined for networks that terminate on R1 will still be forwarded to R1.

C.

The metrics for all transit interfaces on R1 is set to the maximum value of 65,535.

D.

R1 participates in OSPF routing but does not send or receive transit traffic.

E.

R1 does not send or receive transit traffic during the maintenance window even if no alternative paths exist to the given destination.

Question 7

In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received?

Options:

A.

LSA flooding guarantees that all routers will receive them successfully.

B.

LSAs are sent over a TCP connection.

C.

LSAs are acknowledged by the neighboring router.

D.

LSAs are advertised with an acknowledgement bit.

Question 8

Referring to the exhibit, which two statements are correct? (Choose two.)

as

Options:

A.

The maximum wattage that this switch can allocate to attached Ethernet devices is 100 watts.

B.

If the total power consumption exceeds 90 watts, the ge-0/0/11 interface will continue to receive power.

C.

PoE is not enabled on the ge-0/0/0 interface.

D.

The ge-0/0/10 interface supports PoE+.

Question 9

BGP multipath or multihop are not configured in your network.

In this scenario, what is the correct sequence for BGP active route selection?

Options:

A.

higher local preference

shortest AS path

lowest peer address

lowest router ID

lower origin code

B.

higher local preference

shortest AS path

lower origin code

lowest router ID

lowest peer address

C.

higher local preference

lowest router ID

lowest peer address

lower origin code

shortest AS path

D.

higher local preference

shortest AS path

lowest router ID

lowest peer address

lower origin code

Question 10

You are asked to troubleshoot voice quality issues on your newly implement VoIP network. You notice that the voice packets are being dropped. You have verified that the packets are correctly marked for expedited forwarding queue.

Referring to the exhibit, what must you configure to solve the problem?

as

as

as

as

as

Options:

A.

You must configure a multifield classifier to put the VoIP traffic in the correct queue.

B.

You must configure a rewrite rule to ensure that the traffic is scheduled properly in the device.

C.

You must configure a scheduler to allocate bandwidth to the expedited forwarding queue.

D.

You must configure a policer to ensure that the queue is not being starved.

Question 11

You are troubleshooting an EVPN-VXLAN IP fabric and observe the loop shown in the exhibit.

Which two steps would you take to further troubleshoot this problem? (Choose two.)

as

Options:

A.

Verify that the same ESI is configured on the link from the host and that it matches the source.

B.

Issue the show route table bgp.evpn.0 command on Leaf2 and verify that Type 4 routes are present.

C.

Issue the show route table bgp.evpn.0 command on Leaf2 and verify that Type 3 routes are present.

D.

Verify that the same ESI is configured on the two links from the source.

Question 12

A modified deficit round-robin scheduler is defined by which three variables? (Choose three.)

Options:

A.

priority

B.

WRED

C.

transmit rate

D.

Layer 3 fields

E.

buffer size

Question 13

Referring to the outputs shown in the exhibit, which two statements are correct about the IS-IS adjacency? (Choose two.)

as

Options:

A.

R1 is configured to participate in both Level 1 and Level 2.

B.

R2 is configured to participate in both Level 1 and Level 2.

C.

R1 is configured to participate in Level 2 only.

D.

R2 is configured to participate in Level 2 only.

Question 14

Referring to the exhibit, a PIM-SM network is set up to enable communication between multicast devices.

Which two statements are true? (Choose two.)

as

Options:

A.

Before the formation of the rendezvous-point tree, a join message is sent from R1 to R3.

B.

Before the formation of the rendezvous-point tree, an IGMP is sent from the Receiver to R1.

C.

Before the formation of the rendezvous-point tree, an IGMP is sent from the Source to R5.

D.

Before the formation of the rendezvous-point tree, a join message is sent from R1 to R5.

Question 15

Referring to the exhibit, which two statements are correct? (Choose two.)

as

as

Options:

A.

The BGP neighbor can advertise L3 VPN related routes.

B.

The BGP neighbor cannot advertise EVPN related routes.

C.

The BGP neighbor can advertise EVPN related routes.

D.

The BGP neighbor cannot advertise L3 VPN related routes.

Question 16

You are asked to establish full connectivity between all devices in the BGP network.

Referring to the exhibit, which two configuration changes will allow BGP route advertisements? (Choose two.)

as

Options:

A.

On R2, include the loops 2 statement at the [edit protocols bgp family inet unicast] hierarchy.

B.

On R1 and R3, include the loops 2 statement at the [edit protocols bgp family inet unicast] hierarchy.

C.

On R1 and R3, include the advertise-peer-as statement at the [edit protocols bgp group external] hierarchy.

D.

On R2, include the advertise-peer-as statement at the [edit protocols bgp group external] hierarchy.

Question 17

Remote branches connect to the corporate WAN through access switches. The access switches connect to access ports on the WAN distribution switch, as shown in the exhibit. L2PT has previously been configured on the tunnel Layer 2 traffic across the WAN. You decide to move the L2PT tunnel endpoints to the access switches. When you apply the L2PT configuration to the access switches, the ports that connect the access switches to the distribution switch shut down.

Which action would solve this problem?

as

Options:

A.

Configure the links between the access switches and the distribution switch as a trunk port.

B.

Disable the BPDU block function on the access switches.

C.

Disable the BPDU block function on the distribution switch.

D.

Configure a GRE tunnel to encapsulate the L2PT traffic across the WAN.

Question 18

You must provide network connectivity to hosts that fail authentication.

In this scenario, what would be used in a network secured with 802.1X to satisfy this requirement?

Options:

A.

Configure the native-vlan-id parameter on the port.

B.

Use the server-reject-vlan command to specify a guest VLAN.

C.

Configure a secondary IP address on the port for unauthenticated hosts.

D.

Configure the port as a spanning tree edge port.

Question 19

Which address range is used for source-specific multicast?

Options:

A.

239.0.0.0/8

B.

233.0.0.0/8

C.

232.0.0.0/8

D.

224.2.0.0/16

Page: 1 / 7
Total 65 questions