Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-351 - Enterprise Routing and Switching Specialist (JNCIS-ENT)

Page: 2 / 4
Total 107 questions

You enable persistent MAC learning on your Juniper switch

In this scenario, which statement is correct?

A.

You can enable persistent MAC learning on an interface where MAC learning is disabled.

B.

You can enable persistent MAC learning on an interface that is part of a redundant trunk group.

C.

You can only enable persistent MAC learning on an interface in access mode.

D.

You can only enable persistent MAC learning on an interface on which 802.1x authentication is configured.

Two routers share the same highest priority and start time.

A.

In this situation, what is evaluated next when determining the designated router? The router with the lowest router ID become the DR.

B.

The router with the highest router ID becomes the DR

C.

The routers perform another DR election.

D.

The router with the highest MAC address become the DR

You are concerned about spoofed MAC addresses on your LAN.

Which two Layer 2 security features should you enable to minimize this concern? (Choose two.)

A.

dynamic ARP inspection

B.

IP source guard

C.

DHCP snooping

D.

static ARP

You implemented the MAC address limit feature with the shutdown action on all interfaces on your switch.

In this scenario, which statement is correct when a violation occurs?

A.

By default, you must manually clear the violation for the interface to send and receive traffic again.

B.

By default, the violation will automatically be cleared after 300 seconds and the interface will resume sending and receiving traffic for all learned devices.

C.

By default, devices that are learned before the violation occurs are still allowed to send and receive traffic through the specific interface.

D.

By default, the interface will continue to send and receive traffic for all connected devices after a violation has occurred.

Exhibit.

You want to verify prefix information being sent from 10.36.1.4.

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.

The routes displayed have traversed one or more autonomous systems.

B.

The output shows routes that were received prior to the application of any BGP import policies.

C.

The output shows routes that are active and rejected by an import policy.

D.

The routes displayed are being learned from an I BGP peer.

Exhibit

You have configured a GRE tunnel. To reduce the risk of dropping traffic, you have configured a keepalive OAM probe to monitor the state of the tunnel; however, traffic drops are still occurring.

Referring to the exhibit, what is the problem?

A.

For GRE tunnels, the OAM protocol requires that the BFD protocols also be used.

B.

The " event link-adjacency-loss " option must be set.

C.

LLDP needs to be removed from the gr-1/1/10.1 interface.

D.

The hold-time value must be two times the keepalive-time value

In a LAN segment, which tie-breaker would spanning tree consider if equal-cost paths exist between two or more switches to the root bridge?

A.

port priority

B.

bridge ID

C.

port ID

D.

interface number

Which two statements are true about the default VLAN on Juniper switches? (Choose two.)

A.

The default VLAN is set to a VLAN ID of 1 by default

B.

The default VLAN ID is not assigned to any interface.

C.

The default VLAN ID is not visible.

D.

The default VLAN ID can be changed.

You are asked to create a default route that will be advertised to your internal OSPF neighbors. You have three upstream connections to the Internet and you must ensure that when available, all traffic uses ISP1 as your primary connection and only uses ISP2 and ISP3 when ISP1 is not available.

Which solution should you implement in this scenario?

A.

Create a default static route with ISP1 ' s address as the next hop while specifying the addresses for ISP2 and ISP3 as qualified next hops with a preference value of six or higher.

B.

Create a default generate route that includes an import policy to match BGP routes from ISP1 and assign a preference value of four or less.

C.

Create a default static route with each neighbor address as the next hop.

D.

Create a default aggregated route.

After receiving a BGP route, which two conditions are verified by the receiving router to ensure that the received route is valid? (Choose two)

A.

The AS-path length is greater than 0.

B.

The loops do not exist.

C.

The next hop is reachable.

D.

The local preference is greater than 0.