When electing a DIS in an IS-IS network, what is used to break a priority tie?

When electing a DIS in an IS-IS network, what is used to break a priority tie?A . highest router ID B. highest MAC address C. lowest MAC address D. lowest router IDView AnswerAnswer: B Explanation: https://www.juniper.net/documentation/en_US/junos/topics/concept/routing-protocol-is-is-security-designated-router-understanding.html

November 28, 2022 No Comments READ MORE +

Which two statements about aggregate routes in the Junos OS are correct? (Choose two.)

Which two statements about aggregate routes in the Junos OS are correct? (Choose two.)A . An aggregate route has a default next hop of an IP address. B. An aggregate route always shows as active in the routing table. C. An active route can contribute only to a single aggregate...

November 28, 2022 No Comments READ MORE +

In this scenario, which mechanism is used to add interface routes to the forwarding routing instance used in FBF?

You are asked to configure filter-based forwarding (FBF) to forward traffic sourced from a specific subnet to a webserver. In this scenario, which mechanism is used to add interface routes to the forwarding routing instance used in FBF?A . generated routes B. RIB groups C. forwarding policy D. routing policyView...

November 27, 2022 No Comments READ MORE +

Which mechanism is used to share routes between routing tables?

Which mechanism is used to share routes between routing tables?A . RIB groups B. routing instances C. forwarding instances D. filter-based forwardingView AnswerAnswer: A

November 27, 2022 No Comments READ MORE +

Which three statements describe what happens when processing a frame for a switched packet? (Choose three.)

Which three statements describe what happens when processing a frame for a switched packet? (Choose three.)A . The ingress PFE performs the MAC address lookup. B. The frame enters the ingress port and is forwarded out all ports. C. The frame enters the ingress port and is processed by the...

November 27, 2022 No Comments READ MORE +

Which tunneling technology will allow this communication to take place?

Routet-1 and Router-2 must connect through the Internet using a tunneling technology. Hosts that are connected to Router-1 and Router-2 will be sending traffic up to 1500 bytes. The maximum segment size that is supported across the path is 1520 bytes. Which tunneling technology will allow this communication to take...

November 27, 2022 No Comments READ MORE +

What are two Layer 2 firewall filter types? (Choose two.)

What are two Layer 2 firewall filter types? (Choose two.)A . port-based B. packet-based C. flow-based D. VLAN-basedView AnswerAnswer: A,D

November 27, 2022 No Comments READ MORE +

Which feature should you use to address this concern?

You are concerned that someone from outside the company could use an open conference room port to access the network. Which feature should you use to address this concern?A . persistent MAC learning B. 802.1X C. DHCP snooping D. MAC limitingView AnswerAnswer: B

November 26, 2022 No Comments READ MORE +

How would you solve this problem?

Click the Exhibit button. You are building a network and make some configuration changes. While trying to validate these changes, you receive the error shown in the exhibit. How would you solve this problem?A . You must create a new VLAN called all using the VLAN ID of 30. B....

November 26, 2022 No Comments READ MORE +

What types of authentication are supported in Junos for OSPF?

What types of authentication are supported in Junos for OSPF?A . Simple password B. MD5 checksum C. Hitless key chain of MD5 keys/checksums D. All of the aboveView AnswerAnswer: D

November 26, 2022 No Comments READ MORE +