When electing a DIS in an IS-IS network, what is used to break a priority tie?
When electing a DIS in an IS-IS network, what is used to break a priority tie?A . highest router ID B. highest MAC address C. lowest MAC address D. lowest router IDView AnswerAnswer: B Explanation: https://www.juniper.net/documentation/en_US/junos/topics/concept/routing-protocol-is-is-security-designated-router-understanding.html
Which two statements about aggregate routes in the Junos OS are correct? (Choose two.)
Which two statements about aggregate routes in the Junos OS are correct? (Choose two.)A . An aggregate route has a default next hop of an IP address. B. An aggregate route always shows as active in the routing table. C. An active route can contribute only to a single aggregate...
In this scenario, which mechanism is used to add interface routes to the forwarding routing instance used in FBF?
You are asked to configure filter-based forwarding (FBF) to forward traffic sourced from a specific subnet to a webserver. In this scenario, which mechanism is used to add interface routes to the forwarding routing instance used in FBF?A . generated routes B. RIB groups C. forwarding policy D. routing policyView...
Which mechanism is used to share routes between routing tables?
Which mechanism is used to share routes between routing tables?A . RIB groups B. routing instances C. forwarding instances D. filter-based forwardingView AnswerAnswer: A
Which three statements describe what happens when processing a frame for a switched packet? (Choose three.)
Which three statements describe what happens when processing a frame for a switched packet? (Choose three.)A . The ingress PFE performs the MAC address lookup. B. The frame enters the ingress port and is forwarded out all ports. C. The frame enters the ingress port and is processed by the...
Which tunneling technology will allow this communication to take place?
Routet-1 and Router-2 must connect through the Internet using a tunneling technology. Hosts that are connected to Router-1 and Router-2 will be sending traffic up to 1500 bytes. The maximum segment size that is supported across the path is 1520 bytes. Which tunneling technology will allow this communication to take...
What are two Layer 2 firewall filter types? (Choose two.)
What are two Layer 2 firewall filter types? (Choose two.)A . port-based B. packet-based C. flow-based D. VLAN-basedView AnswerAnswer: A,D
Which feature should you use to address this concern?
You are concerned that someone from outside the company could use an open conference room port to access the network. Which feature should you use to address this concern?A . persistent MAC learning B. 802.1X C. DHCP snooping D. MAC limitingView AnswerAnswer: B
How would you solve this problem?
Click the Exhibit button. You are building a network and make some configuration changes. While trying to validate these changes, you receive the error shown in the exhibit. How would you solve this problem?A . You must create a new VLAN called all using the VLAN ID of 30. B....
What types of authentication are supported in Junos for OSPF?
What types of authentication are supported in Junos for OSPF?A . Simple password B. MD5 checksum C. Hitless key chain of MD5 keys/checksums D. All of the aboveView AnswerAnswer: D