|
Question 1. What are two valid actions that can be applied to a frame by a Layer 2 firewall filter? (Choose two) A. Log B. loss-priority C. sample D. count Answer: B, D Explanation: The correct answers are B, D. Reference: You can specify the following filter actions: * accept * count counter-name * discard * dscp code-point (family inet only) * forwarding-class class-name * ipsec-sa ipsec-sa (family inet only) * load-balance group-name (family inet only) * log (family inet and inet6 only) * logical-system logical-system-name (family inet and inet6 only) * loss-priority (high | medium-high | medium-low | low) * next term * next-hop-group group-name (family inet only) * policer policer-name * port-mirror (family bridge, ccc, inet, inet6, and vpls only) * prefix-action action-name (family inet only) * reject(family inet and inet6 only) * routing-instance routing-instance-name (family inet and inet6 only) * sample (family inet, inet6, and mpls only) * service-accounting (service filters and family inet or inet6 only) * service-filter-hit (service filters and family inet or inet6 only) * syslog (family inet and inet6 only) * three-color-policer policer-name * topology topology-name (family inet and inet6 only) * traffic-class code-point (family inet6) only Question 2. Which two statements describe differences between IPv4 and IPv6? (Choose two) A. IPsec is built into IPv6 B. IPv6 uses a 32-bit (4-byte) address and can support up to 4,294,967,296 addresses C. IPv4 supports extension headers whereas IPv6 options are integrated into the base D. IPv6 eliminates the need for NAT Answer: A, D Explanation: Question 3. You must configure an OSPF area that does not accept type 3 link-state advertisements (LSAs) from area 0 (other than the default route) You have configured your area to be stub, but you still see type 3 LSAs. What will account for this behavior? A. You should have configured your area as totally stubby B. You should have used a not-so-stubby-area C. You are experiencing a routing loop D. You have exported routes into OSPF Answer: A Explanation: Question 4. You have configured an IP-IP tunnel between Router A and Router B Which Junos operational mode command is used to verify that the tunnel interface is up and operational? A. show chassis tunnel status B. show tunnel interface C. show interfaces terse D. show interfaces tunnel Answer: C Explanation: Question 5, Which IS-IS packet is used to determine the level of an IS-IS neighbor? A. IIH B. LSP C. PSNP D. CSNP Answer: A Explanation: Question 6. Router A is an OSPF router connected to both Area 0 and Area 1 Area 1 has been configured as a stub area Which two LSA types does Router A suppress from Area 1 ? A. Router LSA B. External LSA C. Summary LSA D. ASBR Summary LSA Answer: B, D Explanation: Question 7. You are logged into a router and have navigated to the (edit routing-options] level of the hierarchy. You have been asked to create a static route that will use 10.10.10.1 as its primary next-hop and 10.10.10.5 as its secondary next-hop. Which command correctly configures this scenario? A. set static route 8/8 10.10.10.1 qualified-next-hop 10.10.10.5 pref 10 B. set static route 8/8 next-hop 10.10.10.1 secondary-next-hop 10.10.10.5 preference 10 C. set static route 8/8 next-hop 10.10.10.1 qualified-next-hop 10.10.10.5 preference 10 D. set static route 8/8 next-hop [10.10.10.1 10.10.10.5] pref 10 Answer: C Explanation: Question 8. Which Junos operational mode command is used to verify that load balancing is working as expected? A. show route all B. show route extensive C. show route balancing D. show route forwarding-table Answer: D Explanation: Question 9. Click the Exhibit button Based on the illustration of the VPLS topology shown in the exhibit, which statement is true? A. PE-C must have a spanning-tree protocol enabled B. CE-C must have BGP enabled C. Traffic forwarded from PE-C to PE-A is forwarded on to PE-B D. Traffic forwarded from PE-C to PE-A is not forwarded on to PE-B Answer: D Explanation: Question 10. Which two values displayed in the output from the show spanning-tree MSTP configuration command must match on all switches participating in the same MSTP region? (Choose two) A. root bridge identifier B. authentication checksum C. context identifier D. configuration digest Answer: C, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.