Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Juniper JN0-649 - Enterprise Routing and Switching Professional (JNCIP-ENT)

Page: 1 / 2
Total 65 questions

A user is attempting to watch a high-definition video being streamed from the media server over the network. However, the user complains that the experienced video quality is poor. While logged on to router B, a Juniper Networks device, you notice that video packets are being dropped.

In this scenario, what would solve this problem?

A.

Adjust the scheduler for the expedited-forwarding forwarding class to support a higher transmit rate.

B.

Adjust the expedited-forwarding BA classifier to router B's ge-0/0/0 interface to support a higher transmit rate.

C.

Adjust the scheduler-map to support a higher transmit rate.

D.

Adjust the expedited-forwarding BA classifier on router B's ge-0/0/1 interface to support a higher transmit rate.

You enable the Multiple VLAN Registration Protocol (MVRP) to automate the creation and management of virtual LANs.

Which statement is correct in this scenario?

A.

The forbidden mode does not register or declare VLANs.

B.

When enabled, MVRP affects all interfaces.

C.

Timers dictate when link state changes are propagated.

D.

MVRP works with RSTP and VSTP.

A Layer 2 connection does not expend across data centers. The IP subnet in a Layer 2 domain is confined within a single data center.

Which EVPN route type is used to communicate prefixes between the data centers?

A.

Type 1

B.

Type 2

C.

Type 4

D.

Type 5

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

BPDUs from the root bridge for VLAN 10 have been received on the ge-0/0/7.0 interface.

B.

DS-1 is the root bridge for VLAN 10.

C.

BPDUs from the root bridge for VLAN 20 have been received on the ge-0/0/7.0 interface.

D.

Default VSTP bridge priority values are configured.

You want to provide Layer 2 connectivity between campus sites using Ethernet switches through a metro Ethernet service provider who is using Q-in-Q tagging on their network.

Referring to the exhibit, what are two design considerations in this environment? (Choose two.)

A.

VXLAN could be implemented on your network across this service provider network.

B.

Each campus switch shown must have a C-Tag 300 configured.

C.

L2PT is required on the SP network to support the spanning tree protocol.

D.

Each campus switch shown must have S-Tag 300 configured.

Referring to the exhibit, how will router E quickly learn that the remote MAC addresses are no longer reachable through the router attached to the failed link?

A.

Router E receives Type 2 withdrawal messages from router D.

B.

Router E receives Type 1 withdrawal messages from router D.

C.

Router E receives Type 1 withdrawal messages from router C.

D.

Router E receives Type 2 withdrawal messages from router C.

You are asked to enforce user authentication using a captive portal before users access the corporate network.

Which statement is correct in this scenario?

A.

HTTPS is the default protocol for a captive portal.

B.

A captive portal can be bypassed using an allowlist command containing a device’s IP address.

C.

When enabled, a captive portal must be applied to each individual interface.

D.

All Web browser requests are redirected to the captive portal until authentication is successful.

Your EX Series switch has IP telephones and computers connected to a single switch port. You are considering implementing the voice VLAN feature to help with this setup.

In this scenario, which two statements are correct? (Choose two.)

A.

The voice VLAN feature must be used with LLDP-MED to associate VLAN ID and 802.1p values with the traffic.

B.

The interfaces must be configured as access ports.

C.

Assigning the incoming voice and data traffic to separate VLANs enables the ability to prioritize the traffic using CoS.

D.

The voice VLAN feature will enable incoming tagged data and voice traffic to be associated with separate VLANs.

You are using 802.1X authentication in your network to secure all ports. You have a printer that does not support 802.1X and you must ensure that traffic is allowed to and from this printer without authentication.

In this scenario, what will satisfy the requirement?

A.

MAC filtering

B.

MACsec

C.

static MAC bypass

D.

MAC RADIUS

Which two multicast listener registration protocols are supported in the Junos operating system? (Choose two.)

A.

MLD

B.

DVMRP

C.

IGMP

D.

PIM