Certsout Juniper-JN0-664

Page 1

Service Provider Professional (JNCIP-SP) Version: Demo [ Total Questions: 10] Web: www.certsout.com Email: support@certsout.com Juniper JN0-664

IMPORTANT NOTICE

Feedback

We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at feedback@certsout.com

Support

If you have any questions about our product, please provide the following items:

exam code

screenshot of the question

login id/email

please contact us at and our technical experts will provide support within 24 hours.

Copyright

support@certsout.com

The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.

Question #:1

Which two statements are correct about IS-IS interfaces? (Choose two.)

If a broadcast interface is in both L1 and L2, one combined hello message is sent for both levels.

If a point-to-point interface is in both L1 and L2, separate hello messages are sent for each level.

If a point-to-point interface is in both L1 and L2, one combined hello message is sent for both levels.

If a broadcast interface is in both L1 and L2, separate hello messages are sent for each level

Answer: B D

Explanation

IS-IS supports two levels of routing: Level 1 (intra-area) and Level 2 (interarea). An IS-IS router can be either Level 1 only, Level 2 only, or both Level 1 and Level 2. A router that is both Level 1 and Level 2 is called a Level 1-2 router. A Level 1-2 router sends separate hello messages for each level on both point-to-point and broadcast interfaces . A point-to-point interface provides a connection between a single source and a single 1 destination. A broadcast interface behaves as if the router is connected to a LAN.

Question #:2

Juniper - JN0-664 Certs Exam 1 of 13 Pass with Valid Exam Questions Pool
A. B. C. D.
Exhibit

A network is using IS-IS for routing.

In this scenario, why are there two TLVs shown in the exhibit?

There are both narrow and wide metric devices in the topology

The interface specified a metric of 100 for L2.

Wide metrics have specifically been requested

Both IPv4 and IPv6 are being used in the topology

Answer: A

Explanation

Juniper - JN0-664 Certs Exam 2 of 13 Pass with Valid Exam Questions Pool
A. B. C. D.

TLVs are tuples of (Type, Length, Value) that can be advertised in IS-IS packets. TLVs can carry different kinds of information in the Link State Packets (LSPs). IS-IS supports both narrow and wide metrics for link costs. Narrow metrics use a single octet to encode the link cost, while wide metrics use three octets. Narrow metrics have a maximum value of 63, while wide metrics have a maximum value of 16777215. If there are both narrow and wide metric devices in the topology, IS-IS will advertise two TLVs for each link: one with the narrow metric and one with the wide metric. This allows backward compatibility with older devices that only support narrow metrics .12

Question #:3

Exhibit

You want to implement the BGP Generalized TTL Security Mechanism (GTSM) on the network

Which three statements are correct in this scenario? (Choose three)

You can implement BGP GTSM between R2, R3, and R4

BGP GTSM requires a firewall filter to discard packets with incorrect TTL.

You can implement BGP GTSM between R2 and R1.

BGP GTSM requires a TTL of 1 to be configured between neighbors.

BGP GTSM requires a TTL of 255 to be configured between neighbors.

Answer: A D E

Juniper - JN0-664 Certs Exam 3 of 13 Pass with Valid Exam Questions Pool A. B. C. D. E.

Explanation

BGP GTSM is a technique that protects a BGP session by comparing the TTL value in the IP header of incoming BGP packets against a valid TTL range. If the TTL value is within the valid TTL range, the packet is accepted. If not, the packet is discarded. The valid TTL range is from 255 – the configured hop count + 1 to 255. When GTSM is configured, the BGP packets sent by the device have a TTL of 255. GTSM provides best protection for directly connected EBGP sessions, but not for multihop EBGP or IBGP sessions because the TTL of packets might be modified by intermediate devices.

In the exhibit, we can see that R2, R3, and R4 are in the same AS (AS 20) and R1 is in a different AS (AS 10). Based on this information, we can infer the following statements:

You can implement BGP GTSM between R2, R3, and R4. This is not correct because R2, R3, and R4 are IBGP peers and GTSM does not provide effective protection for IBGP sessions. The TTL of packets between IBGP peers might be changed by intermediate devices or routing protocols.

BGP GTSM requires a firewall filter to discard packets with incorrect TTL. This is not correct because BGP GTSM does not require a firewall filter to discard packets with incorrect TTL. BGP GTSM uses TCP option 19 to negotiate GTSM capability between peers and uses TCP option 20 to carry the expected TTL value in each packet. The receiver checks the expected TTL value against the actual TTL value and discards packets with incorrect TTL values.

You can implement BGP GTSM between R2 and R1. This is correct because R2 and R1 are EBGP peers and GTSM provides effective protection for directly connected EBGP sessions. The TTL of packets between directly connected EBGP peers is not changed by intermediate devices or routing protocols.

BGP GTSM requires a TTL of 1 to be configured between neighbors. This is not correct because BGP GTSM requires a TTL of 255 to be configured between neighbors. The sender sets the TTL of packets to 255 and the receiver expects the TTL of packets to be 255 minus the configured hop count.

BGP GTSM requires a TTL of 255 to be configured between neighbors. This is correct because BGP GTSM requires a TTL of 255 to be configured between neighbors. The sender sets the TTL of packets to 255 and the receiver expects the TTL of packets to be 255 minus the configured hop count.

Question #:4

Exhibit

Juniper - JN0-664 Certs Exam 4 of 13 Pass with Valid Exam Questions Pool

CE-1 and CE-2 are part of a VPLS called Customer1 No connectivity exists between CE-1 and CE-2. In the process of troubleshooting, you notice PE-1 is not learning any routes for this VPLS from PE-2, and PE-2 is not learning any routes for this VPLS from PE-1.

The route target must match on PE-1 and PE-2.

The route distinguisher must match on PE-1 and PE-2.

The instance type should be changed to I2vpn.

The no-tunnel-services statement should be deleted on both PEs.

Answer: A

Explanation

VPLS is a technology that provides Layer 2 VPN services over an MPLS network. VPLS uses BGP as its control protocol to exchange VPN membership information between PE routers. The route target is a BGP extended community attribute that identifies which VPN a route belongs to. The route target must match on PE routers that participate in the same VPLS instance, otherwise they will not accept or advertise routes for that VPLS.

Juniper - JN0-664 Certs Exam 5 of 13 Pass with Valid Exam Questions Pool
A. B. C. D.

Referring to the exhibit, which statement is correct?

The vrf-target configuration will allow routes to be shared between CE-1 and CE-2.

The vrf-target configuration will stop routes from being shared between CE-1 and CE-2.

Juniper - JN0-664 Certs Exam 6 of 13 Pass with Valid Exam Questions Pool
A. B. Question #:5 Exhibit

The route-distinguisher configuration will allow overlapping routes to be shared between CE-1 and CE-2.

The route-diatinguisher configuration will stop routes from being shared between CE-1 and CE-2.

Answer: C

Explanation

The route distinguisher (RD) is a BGP attribute that is used to create unique VPN IPv4 prefixes for each VPN in an MPLS network. The RD is a 64-bit value that consists of two parts: an administrator field and an assigned number field. The administrator field can be an AS number or an IP address, and the assigned number field can be any arbitrary value chosen by the administrator. The RD is prepended to the IPv4 prefix to create a VPN IPv4 prefix that can be advertised across the MPLS network without causing any overlap or conflict with other VPNs. In this question, we have two PE routers (PE-1 and PE-2) that are connected to two CE devices (CE-1 and CE-2) respectively. PE-1 and PE-2 are configured with VRFs named Customer-A and Customer-B respectively.

Question #:6

An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be processed when received on this interface?

The packet will be discarded.

The packet will be processed by the BA classifier first, then the MF classifier.

The packet will be forwarded with no classification changes.

The packet will be processed by the MF classifier first, then the BA classifier.

Answer: C

Explanation

behavior aggregate (BA) classifiers and multifield (MF) classifiers are two types of classifiers that are used to assign packets to a forwarding class and a loss priority based on different criteria. The forwarding class determines the output queue for a packet. The loss priority is used by a scheduler to control packet discard during periods of congestion.

A BA classifier maps packets to a forwarding class and a loss priority based on a fixed-length field in the packet header, such as DSCP, IP precedence, MPLS EXP, or IEEE 802.1p CoS bits. A BA classifier is computationally efficient and suitable for core devices that handle high traffic volumes. A BA classifier is useful if the traffic comes from a trusted source and the CoS value in the packet header is trusted.

An MF classifier maps packets to a forwarding class and a loss priority based on multiple fields in the packet header, such as source address, destination address, protocol type, port number, or VLAN ID. An MF

Juniper - JN0-664 Certs Exam 7 of 13 Pass with Valid Exam Questions Pool
C. D.
C. D. A. B.

classifier is more flexible and granular than a BA classifier and can match packets based on complex filter rules. An MF classifier is suitable for edge devices that need to classify traffic from untrusted sources or rewrite packet headers.

You can configure both a BA classifier and an MF classifier on an interface. If you do this, the BA classification is performed first and then the MF classification. If the two classification results conflict, the MF classification result overrides the BA classification result.

Based on this information, we can infer the following statements:

The packet will be discarded. This is not correct because the packet will not be discarded by the classifiers unless it matches a filter rule that specifies discard as an action. The classifiers only assign packets to a forwarding class and a loss priority based on their match criteria.

The packet will be processed by the BA classifier first, then the MF classifier. This is correct because if both a BA classifier and an MF classifier are configured on an interface, the BA classification is performed first and then the MF classification. If they conflict, the MF classification result overrides the BA classification result.

The packet will be forwarded with no classification changes. This is not correct because the packet will be classified by both the BA classifier and the MF classifier if they are configured on an interface. The final classification result will determine which output queue and which discard policy will be applied to the packet.

The packet will be processed by the MF classifier first, then the BA classifier. This is not correct because if both a BA classifier and an MF classifier are configured on an interface, the BA classification is performed first and then the MF classification. If they conflict, the MF classification result overrides the BA classification result.

Question #:7 Exhibit

Juniper - JN0-664 Certs Exam 8 of 13 Pass with Valid Exam Questions Pool

Based on the configuration contents shown in the exhibit, which statement is true?

Joins for group 224.7.7.7 are rejected if the source address is 192.168.100.10

Joins for any group are accepted if the group count value is less than 25.

Joins for group 224.7.7.7 are always rejected, regardless of the group count.

Joins for group 224.7.7.7 are accepted if the group count is less than 25

Answer: D

Explanation

BGP policy framework is a set of tools that allows you to control the flow of routing information and apply routing policies based on various criteria. BGP policy framework consists of several components, such as route maps, prefix lists, community lists, AS path lists, and route filters. Route maps are used to define routing policies by matching certain conditions and applying certain actions. Prefix lists are used to filter routes based on their prefixes. Community lists are used to filter routes based on their community attributes. AS path lists are used to filter routes based on their AS path attributes. Route filters are used to filter routes based on their prefix length or range . In this question, we have a route map named ISP-A that has two clauses: clause 10 3 and clause 20. Clause 10 matches any route with a prefix length between 8 and 24 bits and sets the local preference to 200. Clause 20 matches any route with a prefix of 224.7.7.7/32 and rejects it. The route map is applied inbound on the BGP neighborship with ISP-A. Based on this configuration, the correct statement is that joins for group 224.7.7.7 are always rejected, regardless of the group count. This is because clause 20 explicitly denies any route with a prefix of 224.7.7.7/32, which corresponds to the multicast group 224.7.7.7.

Juniper - JN0-664 Certs Exam 9 of 13 Pass with Valid Exam Questions Pool
A. B. C. D.

Referring to the exhibit, PE-1 and PE-2 are getting route updates for VPN-B when neither of them service that VPN

Which two actions would optimize this process? (Choose two.)

Configure the family route-target statement on the PEs.

Configure the family route-target statement on the RR

Configure the resolution rib bgp . 13vpn . 0 resolution-ribs inet. 0 Statement on the PEs.

Configure the resolution rib bgp.l3vpn.O resolution-ribs inet. 0 Statement on the RR

Answer: B D

Explanation

BGP route target filtering is a technique that reduces the number of routers that receive VPN routes and route updates, helping to limit the amount of overhead associated with running a VPN. BGP route target filtering is

Juniper - JN0-664 Certs Exam 10 of 13 Pass with Valid Exam Questions Pool
A. B. C. D. Question #:8 Exhibit

based on the exchange of the route-target address family, which contains information about the VPN membership of each PE device. Based on this information, a PE device can decide whether to accept or reject VPN routes from another PE device.

BGP route target filtering can be configured on PE devices or on route reflectors (RRs). Configuring BGP route target filtering on RRs is more efficient and scalable, as it reduces the number of BGP sessions and updates between PE devices. To configure BGP route target filtering on RRs, the following steps are required:

Configure the family route-target statement under the BGP group or neighbor configuration on the RRs. This enables the exchange of the route-target address family between the RRs and their clients (PE devices).

Configure the resolution rib bgp.l3vpn.0 resolution-ribs inet.0 statement under the routing-options configuration on the RRs. This enables the RRs to resolve next hops for VPN routes using the inet.0 routing table.

Configure an export policy for BGP route target filtering under the routing-options configuration on the RRs. This policy controls which route targets are advertised to each PE device based on their VPN membership.

Question #:9 Exhibit

Juniper - JN0-664 Certs Exam 11 of 13 Pass with Valid Exam Questions Pool

The network shown in the exhibit is based on IS-IS

Which statement is correct in this scenario?

The NSEL byte for Area 0001 is 00.

The area address is two bytes.

The routers are using unnumbered interfaces

The system IDofR1_2 is 192.168.16.1

Answer: A

Explanation

IS-IS is an interior gateway protocol that uses link-state routing to exchange routing information among routers within a single autonomous system. IS-IS uses two types of addresses to identify routers and areas: system ID and area address. The system ID is a unique identifier for each router in an IS-IS domain. The system ID is 6 octets long and can be derived from the MAC address or manually configured. The area address is a variable-length identifier for each area in an IS-IS domain. The area address can be 1 to 13 octets long and is composed of high-order octets of the address. An IS-IS instance may be assigned multiple area addresses, which are considered synonymous. Multiple synonymous area addresses are useful when merging or splitting

Juniper - JN0-664 Certs Exam 12 of 13 Pass with Valid Exam Questions Pool
A. B. C. D.

areas in the domain . In this question, we have a network based on IS-IS with four routers (R1_1, R1_2, R2_1, 1 and R2_2) belonging to area 0001. The area address for area 0001 is 49.0001. The NSEL byte for area 0001 is the last octet of the address, which is 01. The NSEL byte stands for Network Service Access Point Selector (NSAP Selector) and indicates the type of service requested from the network layer . Therefore, the correct 2 statement in this scenario is that the NSEL byte for area 0001 is 01.

References: :1

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_isis/configuration/xe-16/irs-xe-16-book/irs-ovrvw-cf.html :2

https://www.juniper.net/documentation/us/en/software/junos/is-is/topics/concept/is-is-routing-overview.html

Question #:10

Exhibit

You are examining an L3VPN route that includes the information shown in the exhibit

Which statement is correct in this scenario?

The information shows a Type 1 route distinguisher.

The information shows a Type 0 route distinguisher

The information shows a Type 2 route distinguisher.

The information shows a route target

Answer: B

Explanation

The information shows a Type 0 route distinguisher, which is one of the three types of route distinguishers defined by RFC 4364. A route distinguisher is a 64-bit value that is prepended to an IPv4 address to create a VPN-IPv4 address, which is unique within a VPN routing and forwarding (VRF) table. A Type 0 route distinguisher has two fields: an administrator subfield (2 bytes) and an assigned number subfield (6 bytes). The administrator subfield can be an AS number or an IP address, and the assigned number subfield can be any value assigned by the administrator. In this example, the administrator subfield is 65530 (an AS number) and the assigned number subfield is 1.

Juniper - JN0-664 Certs Exam 13 of 13 Pass with Valid Exam Questions Pool
B. C. D.
A.

About certsout.com

certsout.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests.

We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.

View list of all certification exams: All vendors

We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below.

Sales: sales@certsout.com

Feedback: feedback@certsout.com

Support: support@certsout.com

Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Certsout Juniper-JN0-664 by certsout - Issuu