Juniper JN0-351 Questions & Answers

Full Version: 227 Q&A



JN0-351 Dumps
JN0-351 Braindumps
JN0-351 Real Questions
JN0-351 Practice Test
JN0-351 Actual Questions


Juniper
JN0-351
Enterprise Routing and Switching, Specialist (JNCIS-ENT)
https://killexams.com/pass4sure/exam-detail/JN0-351
Question:
Exhibit.


You want to verify prefix information being sent from 10.36.1.4.
Which two statements are correct about the output shown in the exhibit? (Choose two.)
A. The routes displayed have traversed one or more autonomous systems.
B. The output shows routes that were received prior to the application of any BGP import policies.
C. The output shows routes that are active and rejected by an import policy.
D. The routes displayed are being learned from an I BGP peer.
Answer: A,B
Explanation:
The output shown in the exhibit is the result of the command âshow ip bgp neighbor 10.36.1.4 received-routesâ, which
displays all received routes (both accepted and rejected) from the specified neighbor.
Option A is correct, because the routes displayed have traversed one or more autonomous systems. This can be seen
from the AS_PATH attribute, which shows the sequence of AS numbers that the route has passed through. For
example, the route 10.0.0.0/8 has an AS_PATH of 65001 65002, which means that it has traversed AS 65001 and AS
65002 before reaching the local router.
Option B is correct, because the output shows routes that were received prior to the application of any BGP import
policies. This can be seen from the fact that some routes have a status code of ârâ, which means that they are rejected
by an import policy. The âreceived-routesâ keyword shows the routes coming from a given neighbor before the
inbound policy has been applied. To see the routes after the inbound policy has been applied, the âroutesâ keyword
should be used instead.
Option C is incorrect, because the output does not show routes that are active and rejected by an import policy. The
status code of ârâ means that the route is rejected by an import policy, but it does not mean that it is active. The status
code of â>â means that the route is active and selected as the best path. None of the routes in the output have both â>â
and ârâ status codes.
Option D is incorrect, because the routes displayed are not being learned from an IBGP peer. An IBGP peer is a BGP
neighbor that belongs to the same AS as the local router. The output shows that the neighbor 10.36.1.4 has a remote
AS of 65001, which is different from the local AS of 65002. Therefore, the neighbor is an EBGP peer, not an IBGP
peer.
Question: 217
What is the default keepalive time for BGP?
A. 10 seconds
B. 60 seconds
C. 30 seconds
D. 90 seconds
Answer: B
Explanation:
The default keepalive time for BGP is 60 seconds1. The keepalive time is the interval at which BGP sends keepalive
messages to maintain the connection with its peer1. If the keepalive message is not received within the hold time, the
connection is considered lost1. By default, the hold time is three times the keepalive time, which is 180 seconds1.
Question: 218
Which two statements are correct about tunnels? (Choose two.)
A. BFD cannot be used to monitor tunnels.
B. Tunnel endpoints must have a valid route to the remote tunnel endpoint.
C. IP-IP tunnels are stateful.
D. Tunnels add additional overhead to packet size.
Answer: A,B,D
Explanation:
A tunnel is a connection between two computer networks, in which data is sent from one network to another through
an encrypted link. Tunnels are commonly used to secure data communications between two networks or to connect two
networks that use different protocols.
Option B is correct, because tunnel endpoints must have a valid route to the remote tunnel endpoint. A tunnel endpoint
is the device that initiates or terminates a tunnel connection. For a tunnel to be established, both endpoints must be
able to reach each other over the underlying network. This means that they must have a valid route to the IP address of
the remote endpoint1.
Option D is correct, because tunnels add additional overhead to packet size. Tunnels work by encapsulating packets:
wrapping packets inside of other packets. This means that the original packet becomes the payload of the surrounding
packet, and the surrounding packet has its own header and trailer. The header and trailer of the surrounding packet add
extra bytes to the packet size, which is called overhead. Overhead can reduce the efficiency and performance of a
network, as it consumes more bandwidth and processing power2.
Option A is incorrect, because BFD can be used to monitor tunnels. BFD is a protocol that can be used to quickly
detect failures in the forwarding path between two adjacent routers or switches. BFD can be integrated with various
routing protocols and link aggregation protocols to provide faster convergence and fault recovery. BFD can also be
used to monitor the connectivity of tunnels, such as GRE, IPsec, or MPLS.
Option C is incorrect, because IP-IP tunnels are stateless. IP-IP tunnels are a type of tunnels that use IP as both the
encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any
security or authentication features. IP-IP tunnels are stateless, which means that they do not keep track of the state or
status of the tunnel connection. Stateless tunnels do not require any signaling or negotiation between the endpoints, but
they also do not provide any error detection or recovery mechanisms.
Reference: 1: What is Tunneling? | Tunneling in Networking 2: What Is Tunnel In Networking, Its Types, And Its
Benefits? : [Configuring Bidirectional Forwarding Detection] : [IP-IP Tunneling]
Question: 219
Which statement is correct about IP-IP tunnels?
A. IP-IP tunnels only support encapsulating IP traffic.
B. IP-IP tunnels only support encapsulating non-IP traffic.
C. The TTL in the inner packet is decremented during transit to the tunnel endpoint.
D. There are 24 bytes of overhead with IP-IP encapsulation.
Answer: A
Explanation:
IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are
simple and easy to configure, but they do not provide any security or authentication features. IP-IP tunnels only
support encapsulating IP traffic, which means that the payload of the inner packet must be an IP packet. IP-IP tunnels
cannot encapsulate non-IP traffic, such as Ethernet frames or MPLS labels1.
Option A is correct, because IP-IP tunnels only support encapsulating IP traffic. Option B is incorrect,
because IP-IP tunnels only support encapsulating non-IP traffic. Option C is incorrect, because the
TTL in the inner packet is not decremented during transit to the tunnel endpoint. The TTL in the outer
packet is decremented by each router along the path, but the TTL in the inner packet is preserved
until it reaches the tunnel endpoint2. Option D is incorrect, because there are 20 bytes of overhead
with IP-IP encapsulation. The overhead consists of the header of the outer packet, which has a fixed
size of 20 bytes for IPv43.
Reference:
1: IP-IP Tunneling 2: What is tunneling? | Tunneling in networking 3: IPv4 - Header
Question: 220
You are configuring an IS-IS IGP network and do not see the IS-IS adjacencies established. In this scenario, what are
two reasons for this problem? (Choose two.)
A. MTU is not at least 1492 bytes.
B. IP subnets are not a /30 address.
C. The Level 2 routers have mismatched areas.
D. The lo0 interface is not included as an IS-IS interface.
Answer: A,D
Explanation:
Option A suggests that the MTU is not at least 1492 bytes. This is correct because IS-IS requires a minimum MTU of
1492 bytes to establish adjacencies1. If the MTU is less than this, IS-IS adjacencies will not be established1.
Option D suggests that the lo0 interface is not included as an IS-IS interface. This is also correct because the loopback
interface (lo0) is typically used as the router ID in IS-IS1. If the loopback interface is not included in IS-IS, it could
prevent IS-IS adjacencies from being established1. Therefore, options A and D are correct.
Question: 221
You are asked to create a new firewall filter to evaluate Layer 3 traffic that is being sent between VLANs. In this
scenario, which two statements are correct? (Choose two.)
A. You should create a family Ethernet-switching firewall filter with the appropriate match criteria and actions.
B. You should apply the firewall filter to the appropriate VLA
C. You should create a family inet firewall filter with the appropriate match criteria and actions.
D. You should apply the firewall filter to the appropriate IRB interface.
Answer: A,C
Explanation:
A firewall filter is a configuration that defines the rules that determine whether to forward or discard packets at
specific processing points in the packet flow. A firewall filter can also modify the attributes of the packets, such as
priority, marking, or logging. A firewall filter can be applied to various interfaces, protocols, or routing instances on a
Juniper device1.
A firewall filter has a family attribute, which specifies the type of traffic that the filter can evaluate. The family
attribute can be one of the following: inet, inet6, mpls, vpls, iso, or ethernet-switching2. The family inet firewall filter
is used to evaluate IPv4 traffic, which is the most common type of Layer 3 traffic on a network.
To create a family inet firewall filter, you need to specify the appropriate match criteria and actions for each term in
the filter. The match criteria can include various fields in the IPv4 header, such as source address, destination address,
protocol, port number, or DSCP value. The actions can include accept, discard, reject, count, log, policer, or next
term3.
To apply a firewall filter to Layer 3 traffic that is being sent between VLANs, you need to apply the filter to the
appropriate IRB interface. An IRB interface is an integrated routing and bridging interface that provides Layer 3
functionality for a VLAN on a Juniper device. An IRB interface has an IP address that acts as the default gateway for
the hosts in the VLAN. An IRB interface can also participate in routing protocols and forward packets to other VLANs
or networks4.
Therefore, option C is correct, because you should create a family inet firewall filter with the appropriate match criteria
and actions. Option D is correct, because you should apply the firewall filter to the appropriate IRB interface.
Option A is incorrect, because you should not create a family ethernet-switching firewall filter with the appropriate
match criteria and actions. A family ethernet-switching firewall filter is used to evaluate Layer 2 traffic on a Juniper
device. A family ethernet-switching firewall filter can only match on MAC addresses or VLAN IDs, not on IP
addresses or protocols5.
Option B is incorrect, because you should not apply the firewall filter to the appropriate VLAN. A VLAN is a logical
grouping of hosts that share the same broadcast domain on a Layer 2 network. A VLAN does not have an IP address or
routing capability. A firewall filter cannot be applied directly to a VLAN; it must be applied to an interface that
belongs to or connects to the VLAN6.
Reference: 1: Firewall Filters Overview 2: Configuring Firewall Filters 3: Configuring Firewall Filter Match
Conditions and Actions 4: Understanding Integrated Routing and Bridging Interfaces 5: Configuring
Ethernet-Switching Firewall Filters 6: Understanding VLANs
Question:
Exhibit


You have configured a GRE tunnel. To reduce the risk of dropping traffic, you have configured a keepalive OAM
probe to monitor the state of the tunnel; however, traffic drops are still occurring.
Referring to the exhibit, what is the problem?
A. For GRE tunnels, the OAM protocol requires that the BFD protocols also be used.
B. The "event link-adjacency-loss" option must be set.
C. LLDP needs to be removed from the gr-1/1/10.1 interface.
D. The hold-time value must be two times the keepalive-time value
Answer: D
Explanation:
A keepalive OAM probe is a mechanism that can be used to monitor the state of a GRE tunnel and detect any failures
in the tunnel path. A keepalive OAM probe consists of sending periodic packets from one end of the tunnel to the
other and expecting a reply. If no reply is received within a specified time, the tunnel is considered down and the line
protocol of the tunnel interface is changed to down1.
To configure a keepalive OAM probe for a GRE tunnel, you need to specify two parameters: the keepalive-time and
the hold-time. The keepalive-time is the interval between each keepalive packet sent by the local router. The hold-time
is the maximum time that the local router waits for a reply from the remote router before declaring the tunnel down2.
According to the Juniper Networks documentation, the hold-time value must be two times the keepalive-time value for
a GRE tunnel2. This is because the hold-time value must account for both the round-trip time of the keepalive packet
and the processing time of the remote router. If the hold-time value is too small, it may cause false positives and
unnecessary tunnel flaps.
In the exhibit, the configuration shows that the keepalive-time is set to 10 seconds and the hold-time
is set to 15 seconds for the gr-1/1/10.1 interface. This means that the local router will send a keepalive packet every 10
seconds and will wait for 15 seconds for a reply from the remote router. However, this hold-time value is not two
times the keepalive-time value, which violates the recommended configuration. This may cause traffic drops if the
remote router takes longer than 15 seconds to reply.
Therefore, option D is correct, because the hold-time value must be two times the keepalive-time value for a GRE
tunnel. Option A is incorrect, because BFD is not required for GRE tunnels; BFD is another protocol that can be used
to monitor tunnels, but it is not compatible with GRE keepalives3. Option B is incorrect, because the âevent link-
adjacency-lossâ option is not related to GRE tunnels; it is an option that can be used to trigger an action when a link
goes down4. Option C is incorrect, because LLDP does not need to be removed from the gr-1/1/10.1 interface; LLDP
is a protocol that can be used to discover neighboring devices and their capabilities, but it does not interfere with GRE
tunnels5.
Reference:
1: Configuring Keepalive Time and Hold time for a GRE Tunnel Interface 2: keepalive | Junos OS |
Juniper Networks 3: Configuring Bidirectional Forwarding Detection 4: event link-adjacency-loss |
Junos OS | Juniper Networks 5: Understanding Link Layer Discovery Protocol
Question:
Exhibit




You are a network operator troubleshooting BGP connectivity.
Which two statements are correct about the output shown in the exhibit? (Choose two.)
A. Peer 10.32.1.2 is configured for AS 63645.
B. The BGP session is not established.
C. The R1 is configured for AS 65400.
D. The routers are exchanging IPv4 routes.
Answer: A,B,C
Explanation:
Option B suggests that the BGP session is not established. This is correct because in the output, the state of the BGP
session is shown as âIdleâ. In BGP, an âIdleâ state means that the BGP session is not currently established1.
Option C suggests that R1 is configured for AS 65400. This is also correct because in the output, itâs shown that the
local AS number is 654001. The local AS number represents the Autonomous System (AS) number of the router on
which youâre checking the BGP session1.
Question: 224
What is the maximum allowable MTU size for a default GRE tunnel without IPv4 traffic fragmentation?
A. 1496 bytes
B. 1480 bytes
C. 1500 bytes
D. 1476 bytes
Answer: D
Explanation:
The maximum allowable MTU size for a default GRE tunnel without IPv4 traffic fragmentation is 1476 bytes1. This is
because GRE packets are formed by the addition of the original packets and the required GRE headers1. These headers
are 24-bytes in length and since these headers are added to the original frame, depending on the original size of the
packet we may run into IP MTU problems1. The most common IP MTU is 1500-bytes in length (Ethernet)1. When the
tunnel is created, it deducts the 24-bytes it needs to encapsulate the passenger protocols and that is the IP MTU it will
use1. For example, if we are forming a tunnel over FastEthernet (IP MTU 1500) the IOS calculates the IP MTU on the
tunnel as: 1500-bytes from Ethernet - 24-bytes for the GRE encapsulation = 1476-Bytes1.
Question: 17
You are a network operator who wants to add a second ISP connection and remove the default route to the existing
ISP You decide to deploy the BGP protocol in the network.
What two statements are correct in this scenario? (Choose two.)
A. IBGP updates the next-hop attribute to ensure reachability within an A
B. IBGP peers advertise routes received from EBGP peers to other IBGP peers.
C. IBGP peers advertise routes received from IBGP peers to other IBGP peers.
D. EBGP peers advertise routes received from IBGP peers to other EBGP peers.
Answer: A
Explanation:
A is correct because IBGP updates the next-hop attribute to ensure reachability within an AS. This is because the next-
hop attribute is the IP address of the router that advertises the route to a BGP peer. If the next-hop attribute is not
changed by IBGP, it would be the IP address of an external router, which may not be reachable by all routers within
the AS. Therefore, IBGP updates the next-hop attribute to the IP address of the router that received the route from an
EBGP peer1.
B is correct because IBGP peers advertise routes received from EBGP peers to other IBGP peers. This is because BGP
follows the rule of advertising only the best route to a destination, and EBGP routes have a higher preference than
IBGP routes. Therefore, IBGP peers advertise routes learned from an EBGP peer to all BGP peers, including both
EBGP and IBGP peers1.
Question: 225
You are troubleshooting a BGP routing issue between your network and a customer router and are reviewing the BGP
routing policies.
Which two statements are correct in this scenario? (Choose two.)
A. Export policies are applied to routes in the RIB-ln table.
B. Import policies are applied to routes in the RIB-Local table.
C. Import policies are applied after the RIB-ln table.
D. Export policies are applied after the RIB-Local table.
Answer: A,C,D
Explanation:
In BGP, routing policies are used to control the flow of routing information between BGP peers1. Option C suggests
that import policies are applied after the RIB-In table. This is correct because import policies in BGP are applied to
routes that are received from a BGP peer, before they are installed in the local BGP Routing Information Base (RIB-
In)1. The RIB-In is a database that stores all the routes that are received from all peers1.
Option D suggests that export policies are applied after the RIB-Local table. This is correct because export policies in
BGP are applied to routes that are being advertised to a BGP peer, after they have been selected from the local BGP
Routing Information Base (RIB-Local)1. The RIB-Local is a database that stores all the routes that the local router is
using1. Therefore, options C and D are correct.
Question: 226
You are asked to connect an IP phone and a user computer using the same interface on an EX Series switch. The
traffic from the computer does not use a VLAN tag, whereas the traffic from the IP phone uses a VLAN tag.
Which feature enables the interface to receive both types of traffic?
A. native VLAN
B. DHCP snooping
C. MAC limiting
D. voice VLAN
Answer: D
Explanation:
The feature that enables an interface on an EX Series switch to receive both untagged traffic (from the computer) and
tagged traffic (from the IP phone) is the voice VLAN12.
The voice VLAN feature in EX-series switches enables access ports to accept both data (untagged) and voice (tagged)
traffic and separate that traffic into different VLANs12. This allows the switch to differentiate between voice and data
traffic, ensuring that voice traffic can be treated with a higher priority12. Therefore, option D is correct.
Question: 2
Exhibit


Which command displays the output shown in the exhibit?
A. show route forwarding-table
B. show ethernet-switching table
C. show ethernetâswitching table extensive
D. show route forwardingâtable family ethernet-switching
Answer: B
Explanation:
The output shown in the exhibit is a brief display of the Ethernet switching table, which shows the learned Layer 2
MAC addresses for each VLAN and interface1.
The command show ethernet-switching table displays the Ethernet switching table with brief information, such as the
destination MAC address, the VLAN name, the forwarding state, and the interface name1.
The command show route forwarding-table displays the routing table information for each protocol family, such as
inet, inet6, mpls, iso, and so on2. It does not show the Ethernet switching table or the MAC addresses.
The command show ethernet-switching table extensive displays the Ethernet switching table with extensive
information, such as the destination MAC address, the VLAN name, the forwarding state, the interface name, the
VLAN index, and the tag type1. It shows more details than the brief output shown in the exhibit.
The command show route forwarding-table family ethernet-switching displays the routing table information for the
ethernet-switching protocol family, which shows the destination MAC address, the next-hop MAC address, and the
interface name3. It does not show the VLAN name or the forwarding state.

User: Tillie*****

I am generally wary of online resources as many are posted by unreliable sources that can mislead me into studying unnecessary topics while neglecting important ones. However, Killexams.com resources are exceptional and helped me conquer the JN0-351 exam preparation. Thanks to their extensive resources, I was able to pass the exam on my second attempt and score 87%.
User: Tanny*****

I never thought I would be able to pass the JN0-351 exam, but thanks to Killexams.com, I did. Their practice tests and study materials were excellent. I informed my friends about Killexams.com, and they too found their courses top-notch. It was an extraordinary experience for me. Thanks to Killexams.com for making this possible.
User: Thomas*****

I recently passed the jn0-351 exam with an excellent score, and while I cannot take full credit for it, I must thank Killexams.com for their invaluable support. Thanks to their exam simulator and relevant study material, I was able to confidently answer any question that came my way during the exam. I highly recommend Killexams to anyone preparing for the jn0-351 exam.
User: John*****

I passed the jn0-351 exam this month, thanks to the excellent training questions and answers provided by killexams.com. I can vouch for the dependability of this website. Initially, I did not think that practice tests could be this helpful, but after using killexams.com, I realized that it offers more than a mere sell-off. It provides you with the resources you need to pass your jn0-351 exam and also enables you to learn the concepts you will need. It is the perfect solution for saving time and energy. I highly recommend killexams.com to everyone.
User: Yuri*****

The JN0-351 practice materials from killexams.com provided an organized and well-structured approach to my exam preparation. With their help, I was able to achieve excellent scores in the exam. The instructions were engaging, and I had an enjoyable learning experience.

Features of iPass4sure JN0-351 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 227 Q&A

Get Full Version

All Juniper Exams

Juniper Exams

Certification and Entry Test Exams

Complete exam list