لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which origin code is preferred by BGP?
A. Internal
B. External
C. Incomplete
D. Null
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which statement is true regarding BGP FlowSpec?
A. It uses a remote triggered black hole to protect a network from a denial-of-service attack
B. It uses dynamically created routing policies to protect a network from denial-of-service attacks
C. It is used to protect a network from denial-of-service attacks dynamically
D. It verifies that the source IP of the incoming packet has a resolvable route in the routing table
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Exhibit Referring to the exhibit, PIM-SM is configured on all routers, and Anycast-RP with Anycast-PIM is used for the discovery mechanism on RP1 and RP2. The interface metric values are shown for the OSPF area. In this scenario, which two statements are correct about which RP is used? (Choose two.)
A. Source2 will use RP2 and Received will use RP2 for group 224
B. Source2 will use RP1 and Receiver2 will use RP1 for group 224
C. Source1 will use RP1 and Receiver1 will use RP1 for group 224
D. Source1 will use RP1 and Receiver1 will use RP2 for group 224
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which two statements about IS-IS are correct? (Choose two.)
A. PSNPs are flooded periodically
B. PSNPs contain only descriptions of LSPs
C. CSNPs are flooded periodically
D. CSNPs contain only descriptions of LSPs
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which two statements describe PIM-SM? (Choose two)
A. Routers with receivers send join messages to their upstream neighbors
B. Routers without receivers must periodically prune themselves from the SPT
C. Traffic is initially flooded to all routers and an S,G is maintained for each group
D. Traffic is only forwarded to routers that request to join the distribution tree
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Exhibit The environment is using BGP All devices are in the same AS with reachability redundancy Referring to the exhibit, which statement is correct?
A. RR1 is peered to Client2 and RR2
B. RR2 is in an OpenConfirm State until RR1 becomes unreachable
C. Client1 is peered to Client2 and Client3
D. Peering is dynamically discovered between all devices
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which two statements are correct about a sham link? (Choose two.)
A. It creates an OSPF multihop neighborship between two PE routers
B. It creates a BGP multihop neighborship between two PE routers
C. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes
D. The PEs exchange Type 3 OSPF LSAs instead of Type 1 OSPF LSAs for the L3VPN routes
عرض الإجابة
اجابة صحيحة: A
السؤال #8
An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be processed when received on this interface?
A. The packet will be discarded
B. The packet will be processed by the BA classifier first, then the MF classifier
C. The packet will be forwarded with no classification changes
D. The packet will be processed by the MF classifier first, then the BA classifier
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Exhibit user@Rl show configuration interpolated-profile { interpolate { fill-level [ 50 75 drop—probability [ > } class-of-service drop-profiles ]; 20 60 ]; Which two statements are correct about the class-of-service configuration shown in the exhibit? (Choose two.)
A. The drop probability jumps immediately from 20% to 60% when the queue level reaches 75% full
B. The drop probability gradually increases from 20% to 60% as the queue level increases from 50%full to 75% full
C. To use this drop profile, you reference it in a scheduler
D. To use this drop profile, you apply it directly to an interface
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which two EVPN route types are used to advertise a multihomed Ethernet segment? (Choose two )
A. Type 1
B. Type 3
C. Type 4
D. Type 2
عرض الإجابة
اجابة صحيحة: B
السؤال #11
You are asked to protect your company's customers from amplification attacks. In this scenario, what is Juniper's recommended protection method?
A. ASN prepending
B. BGP FlowSpec
C. destination-based Remote Triggered Black Hole
D. unicast Reverse Path Forwarding
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which two statements are correct about IS-IS interfaces? (Choose two.)
A. If a broadcast interface is in both L1 and L2, one combined hello message is sent for both levels
B. If a point-to-point interface is in both L1 and L2, separate hello messages are sent for each level
C. If a point-to-point interface is in both L1 and L2, one combined hello message is sent for both levels
D. If a broadcast interface is in both L1 and L2, separate hello messages are sent for each level
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Exhibit Which two statements about the output shown in the exhibit are correct? (Choose two.)
A. The PE is attached to a single local site
B. The connection has not flapped since it was initiated
C. There has been a VLAN ID mismatch
D. The PE router has the capability to pop flow labels
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which statement is correct about IS-IS when it performs the Dijkstra algorithm?
A. The local router moves its own local tuples into the candidate database
B. When a new neighbor ID in the tree database matches a router ID in the LSDB, the neighbor ID is moved to the candidate database
C. Tuples with the lowest cost are moved from the tree database to the LSDB
D. The algorithm will stop processing once the tree database is empty
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Exhibit Referring to the exhibit, which three statements are correct about route 10 0 0.0/16 when using the default BGP advertisement rules'? (Choose three.)
A. R1 will prepend AS 65531 when advertising 10 0
B. R1 will advertise 10
C. R2 will advertise 10
D. R4 will advertise 10 0
E. R2 will advertise 10
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Exhibit R1 and R8 are not receiving each other's routes Referring to the exhibit, what are three configuration commands that would solve this problem? (Choose three.)
A. Configure loops and advertise-peer-as on routers in AS 64497 and AS 64450
B. Configure loops on routers in AS 65412 and advertise-peer-as on routers in AS 64498
C. Configure as-override on advertisement from AS 64500 toward AS 64512
D. Configure remove-private on advertisements from AS 64497 toward AS 64498
E. Configure remove-private on advertisements from AS 64500 toward AS 64499
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Exhibit Referring to the exhibit, a working L3VPN exists that connects VPN-A sites CoS is configured correctly to match on the MPLS EXP bits of the LSP, but when traffic is sent from Site-1 to Site-2, PE-2 is not classifying the traffic correctly What should you do to solve the problem?
A. Configure the explicit-null statement on PE-1
B. Configure the explicit-null statement on PE-2
C. Configure VPN prefix mapping for the PE-1_to_PE-2 LSP
D. Set a static CoS value for the PE-1_to_PE-2 LSP
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Exhibit Which two statements are true about the OSPF adjacency displayed in the exhibit? (Choose two.)
A. There is a mismatch in the hello interval parameter between routers R1 and R2
B. There is a mismatch in the dead interval parameter between routers R1 and R2
C. There is a mismatch in the OSPF hold timer parameter between routers R1 and R2
D. There is a mismatch in the poll interval parameter between routers R1 and R2
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Exhibit You must ensure that the VPN backbone is preferred over the back door intra-area link as long as the VPN is available. Referring to the exhibit, which action will accomplish this task?
A. Configure an import routing policy on the CE routers that rejects OSPF routes learned on the backup intra-area link
B. Enable OSPF traffic-engineering
C. Configure the OSPF metric on the backup intra-area link that is higher than the L3VPN link
D. Create an OSPF sham link between the PE routers
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Exhibit You want to implement the BGP Generalized TTL Security Mechanism (GTSM) on the network Which three statements are correct in this scenario? (Choose three)
A. You can implement BGP GTSM between R2, R3, and R4
B. BGP GTSM requires a firewall filter to discard packets with incorrect TTL
C. You can implement BGP GTSM between R2 and R1
D. BGP GTSM requires a TTL of 1 to be configured between neighbors
E. BGP GTSM requires a TTL of 255 to be configured between neighbors
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: