Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
JN0-664 : Service Provider Routing and Switching, Professional (JNCIP-SP) Exam
Juniper JN0-664 Questions & Answers
Full Version: 133 Q&A
JN0-664 Dumps
JN0-664 Braindumps
JN0-664 Real Questions
JN0-664 Practice Test
JN0-664 Actual Questions
Juniper
JN0-664
Service Provider Routing and Switching, Professional
(JNCIP-SP)
https://killexams.com/pass4sure/exam-detail/JN0-664
Question:
Exhibit
Referring to the exhibit, CE-1 is providing NAT services for the hosts at Site 1 and you must provide Internet access
for those hosts
Which two statements are correct in this scenario? (Choose two.)
A. You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-
B. inet.0 table as the next hop
C. You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-
D. inet.0 table as the next hop.
E. You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-
F. inet.0 table.
G. You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-
H. inet.0 table to the inet.0 table.
Answer: A,B
Explanation:
To provide Internet access for the hosts at Site 1, you need to configure static routes in the main routing instance on
PE-1 that point to the VPN-A.inet.0 table as the next hop. This allows PE-1 to forward traffic from the Internet to CE-
1 using MPLS labels and vice versa. You need to configure two static routes: one for the 10.1.2.0/24 prefix that
represents the private network of Site 1, and one for the 203.0.113.1/32 prefix that represents the public IP address of
CE-1.
Question: 120
Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )
A. rewrite rules
B. behavior aggregate classifiers
C. traffic shapers
D. fixed classifiers
E. multifield classifiers
Answer: A,B,D,E
Explanation:
Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:
â Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different
forwarding classes and loss priorities based on predefined or user-defined values.
â Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding
classes and loss priorities based on predefined values.
â Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different
forwarding classes and loss priorities based on user-defined values and filters.
Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or
shape outgoing traffic based on CoS policies.
Question:
Exhibit
You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS
number.
Which two steps will accomplish this task? (Choose two.)
A. Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
B. Configure the BGP group with the as-override parameter on R2 and R3
C. Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
D. Configure the BGP group with the as-override parameter on R1 and R4
Answer: A,B
Explanation:
The advertise-peer-as parameter allows a router to advertise its peerâs AS number as part of the AS path attribute
when sending BGP updates to other peers. This parameter is useful when two routers in the same AS need to exchange
routes through another AS, such as in the case of R1 and R4. By configuring this parameter on R1 and R4, they can
advertise each otherâs AS number to R2 and R3, respectively.
The as-override parameter allows a router to replace the AS number of its peer with its own AS number when
receiving BGP updates from that peer. This parameter is useful when two routers in different ASes need to exchange
routes through another AS that has the same AS number as one of them, such as in the case of R2 and R3. By
configuring this parameter on R2 and R3, they can override the AS number of R1 and R4 with their own AS number
when sending BGP updates to each other.
Question: 122
You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers.
Which action accomplishes this task?
A. Configure the ignore-attached-bit parameter on all L2 routers.
B. Configure all routers to allow wide metrics.
C. Configure all routers to be L1.
D. Configure the ignore-attached-bit parameter on all L1 routers
Answer: D
Explanation:
The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of
the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit
to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal
routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only
the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1
routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their
routing tables.
Question: 1
Exhibit
CE-1 must advertise ten subnets to PE-1 using BGP Once CE-1 starts advertising the subnets to PE-1, the BGP
peering state changes to Active.
Referring to the CLI output shown in the exhibit, which statement is correct?
A. CE-1 is advertising its entire routing table.
B. CE-1 is configured with an incorrect peer AS
C. The prefix limit has been reached on PE-1
D. CE-1 is unreachable
Answer: B
Explanation:
The problem in this scenario is that CE-1 is configured with an incorrect peer AS number for its BGP session with PE-
1. The CLI output shows that CE-1 is using AS 65531 as its local AS number and AS 65530 as its peer AS number.
However, PE-1 is using AS 65530 as its local AS number and AS 65531 as its peer AS number. This causes a
mismatch in the BGP OPEN messages and prevents the BGP session from being established. To solve this problem,
CE-1 should configure its peer AS number as 65530 under [edit protocols bgp group external] hierarchy level.
Question: 124
By default, which statement is correct about OSPF summary LSAs?
A. All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
B. The area-range command must be installed on all routers.
C. Type 3 LSAs are advertised for routes in Type 1 LSAs.
D. The metric associated with a summary route will be equal to the lowest metric associated with an individual
contributing route
Answer: C
Explanation:
OSPF uses different types of LSAs to describe different aspects of the network topology. Type 1 LSAs are also known
as router LSAs, and they describe the links and interfaces of a router within an area. Type 3 LSAs are also known as
summary LSAs, and they describe routes to networks outside an area but within the same autonomous system (AS).
By default, OSPF will summarize routes from Type 1 LSAs into Type 3 LSAs when advertising them across area
boundaries.
Question: 125
When building an interprovider VPN, you notice on the PE router that you have hidden routes which are received
from your BGP peer with family inet labeled-unica3t configured.
Which parameter must you configure to solve this problem?
A. Under the family inet labeled-unicast hierarchy, add the explicit null parameter.
B. Under the protocols ospf hierarchy, add the traffic-engineering parameter.
C. Under the family inet labeled-unicast hierarchy, add the resolve-vpn parameter.
D. Under the protocols mpls hierarchy, add the traffic-engineering parameter
Answer: C
Explanation:
The resolve-vpn parameter is a BGP option that allows a router to resolve labeled VPN-IPv4 routes using unlabeled
IPv4 routes received from another BGP peer with family inet labeled-unicast configured. This option enables
interprovider VPNs without requiring MPLS labels between ASBRs or using VRF tables on ASBRs. In this scenario,
you need to configure the resolve-vpn parameter under [edit protocols bgp group external family inet labeled-unicast]
hierarchy level on both ASBRs.
Question: 126
Which two EVPN route types are used to advertise a multihomed Ethernet segment? (Choose two )
A. Type 1
B. Type 3
C. Type 4
D. Type 2
Answer: A,C
Explanation:
EVPN is a solution that provides Ethernet multipoint services over MPLS networks. EVPN uses BGP to distribute
endpoint provisioning information and set up pseudowires between PE devices. EVPN uses different route types to
convey different information in the control plane.
The following are the main EVPN route types:
â Type 1 - Ethernet Auto-Discovery Route: This route type is used for network-wide messaging and discovery of other
PE devices that are part of the same EVPN instance. It also carries information about the redundancy mode and load
balancing algorithm of the PE devices.
â Type 2 - MAC/IP Advertisement Route: This route type is used for MAC and IP address learning and advertisement
between PE devices. It also carries information about the Ethernet segment identifier (ESI) and the label for
forwarding traffic to the MAC or IP address.
â Type 3 - Inclusive Multicast Ethernet Tag Route: This route type is used for broadcast, unknown unicast, and
multicast (BUM) traffic forwarding. It also carries information about the multicast group and the label for forwarding
BUM traffic.
â Type 4 - Ethernet Segment Route: This route type is used for multihoming scenarios, where a CE device is connected
to more than one PE device. It also carries information about the ESI and the designated forwarder (DF) election
process.
Question: 1
Exhibit
A network designer would like to create a summary route as shown in the exhibit, but the configuration is not working.
Which three configuration changes will create a summary route? (Choose three.)
A. set policy-options policy-statement leak-v6 term DC-routes then reject
B. delete policy-options policy-statement leak-v6 term DC-routes from route-filter 2001: db9:a: fa00 : :/6l longer
C. set policyâoptions policy-statement leak-v term DCâroutes from route-filter 2001:db9:a:faOO::/61 exact
D. delete protocols isis export summary-v6
E. set protocols isis import summary-v6
Answer: A,B,C,D
Explanation:
To create a summary route for IS-IS, you need to configure a policy statement that matches the prefixes to be
summarized and sets the next-hop to discard. You also need to configure a summary-address statement under the IS-
IS protocol hierarchy that references the policy statement. In this case, the policy statement leak-v6 is trying to match
the prefix 2001:db9:a:fa00::/61 exactly, but this prefix is not advertised by any router in the network. Therefore, no
summary route is created. To fix this, you need to delete the longer keyword from the route-filter term and change the
prefix length to /61 exact. This will match any prefix that falls within the /61 range. You also need to delete the export
statement under protocols isis, because this will export all routes that match the policy statement to other IS-IS routers,
which is not desired for a summary route.
Question: 128
An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be
processed when received on this interface?
A. The packet will be discarded.
B. The packet will be processed by the BA classifier first, then the MF classifier.
C. The packet will be forwarded with no classification changes.
D. The packet will be processed by the MF classifier first, then the BA classifier.
Answer: C
Explanation:
behavior aggregate (BA) classifiers and multifield (MF) classifiers are two types of classifiers that are used to assign
packets to a forwarding class and a loss priority based on different criteria. The forwarding class determines the output
queue for a packet. The loss priority is used by a scheduler to control packet discard during periods of congestion.
A BA classifier maps packets to a forwarding class and a loss priority based on a fixed-length field in the packet
header, such as DSCP, IP precedence, MPLS EXP, or IEEE
Question: 1
Exhibit
A network is using IS-IS for routing.
In this scenario, why are there two TLVs shown in the exhibit?
A. There are both narrow and wide metric devices in the topology
B. The interface specified a metric of 100 for L2.
C. Wide metrics have specifically been requested
D. Both IPv4 and IPv6 are being used in the topology
Answer: A
Explanation:
TLVs are tuples of (Type, Length, Value) that can be advertised in IS-IS packets. TLVs can carry different kinds of
information in the Link State Packets (LSPs). IS-IS supports both narrow and wide metrics for link costs. Narrow
metrics use a single octet to encode the link cost, while wide metrics use three octets. Narrow metrics have a
maximum value of 63, while wide metrics have a maximum value of 16777215. If there are both narrow and wide
metric devices in the topology, IS-IS will advertise two TLVs for each link: one with the narrow metric and one with
the wide metric. This allows backward compatibility with older devices that only support narrow metrics12.
Question: 130
In IS-IS, which two statements are correct about the designated intermediate system (DIS) on a multi-access network
segment? (Choose two)
A. A router with a priority of 10 wins the DIS election over a router with a priority of 1.
B. A router with a priority of 1 wins the DIS election over a router with a priority of 10.
C. On the multi-access network, each router forms an adjacency to every other router on the segment
D. On the multi-access network, each router only forms an adjacency to the DI
Answer: A,D
Explanation:
In IS-IS, a designated intermediate system (DIS) is a router that is elected on a multi-access network segment (such as
Ethernet) to perform some functions on behalf of other routers on the same segment. A DIS is responsible for sending
network link-state advertisements (LSPs), which describe all the routers attached to the network. These LSPs are
flooded throughout a single area. A DIS also generates pseudonode LSPs, which represent the multi-access network as
a single node in the link-state database. A DIS election is based on the priority value configured on each routerâs
interface connected to the multi-access network. The priority value ranges from 0 to 127, with higher values indicating
higher priority. The router with the highest priority becomes the DIS for the area (Level 1, Level 2, or both). If routers
have the same priority, then the router with the highest MAC address is elected as the DIS. By default, routers have a
priority value of 64. On a multi-access network, each router only forms an adjacency to the DIS, not to every other
router on the segment. This reduces the amount of hello packets and LSP
Question: 1
Exhibit
You are attempting to summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500. You implement the
export policy shown in the exhibit and all routes from the routing table stop being advertised.
In this scenario, which two steps would you take to summarize the route in BGP? (Choose two.)
A. Remove the from protocol bgp command from the export policy.
B. Add the set protocols bgp family inet unicast add-path command to allow additional routes to the RIB tables.
C. Add the set routing-options static route 203.0.113.123/25 discard command.
D. Replace exact in the export policy with orlonger.
Answer: A,C,D
Explanation:
To summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500, you need to do the following:
â Add the set routing-options static route 203.0.113.128/25 discard command. This creates a static route for the
summary prefix and discards any traffic destined to it. This is necessary because BGP can only advertise routes that
are present in the routing table.
â Replace exact in the export policy with orlonger. This allows R8 to match and advertise any route that is equal or
more specific than the summary prefix. The exact term only matches routes that are exactly equal to the summary
prefix, which is not present in the routing table.
Question: 1
Exhibit
You must ensure that the VPN backbone is preferred over the back door intra-area link as long as the VPN is
available. Referring to the exhibit, which action will accomplish this task?
A. Configure an import routing policy on the CE routers that rejects OSPF routes learned on the backup intra-area link.
B. Enable OSPF traffic-engineering.
C. Configure the OSPF metric on the backup intra-area link that is higher than the L3VPN
link.
D. Create an OSPF sham link between the PE routers.
Answer: D
Explanation:
A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an
L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring
an intra-area back door link over the VPN backbone. To create a sham link, you need to configure the local and
remote addresses of the PE routers under the [edit protocols ospf area area-id] hierarchy level1.
Question:
Exhibit
Which two statements about the output shown in the exhibit are correct? (Choose two.)
A. The PE is attached to a single local site.
B. The connection has not flapped since it was initiated.
C. There has been a VLAN ID mismatch.
D. The PE router has the capability to pop flow labels
Answer: A,D
Explanation:
According to 1 and 2, BGP Layer 2 VPNs use BGP to distribute endpoint provisioning information and set up
pseudowires between PE devices. BGP uses the Layer 2 VPN (L2VPN) Routing Information Base (RIB) to store
endpoint provisioning information, which is updated each time any Layer 2 virtual forwarding instance (VFI) is
configured. The prefix and path information is stored in the L2VPN database, which allows BGP to make decisions
about the best path.
In the output shown in the exhibit, we can see some information about the L2VPN RIB and the pseudowire state.
Based on this information, we can infer the following statements:
â The PE is attached to a single local site. This is correct because the output shows only one local site ID (1) under the
L2VPN RIB section. A local site ID is a unique identifier for a site within a VPLS domain. If there were multiple local
sites attached to the PE, we would see multiple local site IDs with different prefixes.
â The connection has not flapped since it was initiated. This is correct because the output shows that the uptime of the
pseudowire is equal to its total uptime (1w6d). This means that the pseudowire has been up for one week and six days
without any interruption or flap.
â There has been a VLAN ID mismatch. This is not correct because the output shows that the remote and local VLAN
IDs are both 0 under the pseudowire state section. A VLAN ID mismatch occurs when the remote and local VLAN
IDs are different, which can cause traffic loss or misdelivery. If there was a VLAN ID mismatch, we would see
different values for the remote and local VLAN IDs.
â The PE router has the capability to pop flow labels. This is correct because the output shows that the flow label pop
bit is set under the pseudowire state section. The flow label pop bit indicates that the PE router can pop (remove) the
MPLS flow label from the packet before forwarding it to the CE device. The flow label is an optional MPLS label that
can be used for load balancing or traffic engineering purposes.
User: Zakhar***** I had the best level of preparation for the JN0-664 exam thanks to Killexams.com. It was an engaging way to prepare, and the platform helped me grow. I found their resources useful and was able to complete my preparation with ease. |
User: Lada***** I passed the JN0-664 exam with flying colors, scoring 88% thanks to killexams.com. The exam was tough, but killexams.com Questions and Answers and exam Simulator made it easier. Their exam simulator is a gift, and the question-and-answer bank and various test types were excellent ways to test my knowledge. |
User: Taisia***** I passed the jn0-664 exam this month, thanks to the excellent training questions and answers provided by killexams.com. I can vouch for the dependability of this website. Initially, I did not think that practice tests could be this helpful, but after using killexams.com, I realized that it offers more than a mere sell-off. It provides you with the resources you need to pass your jn0-664 exam and also enables you to learn the concepts you will need. It is the perfect solution for saving time and energy. I highly recommend killexams.com to everyone. |
User: Prisha***** The jn0-664 exam is supposed to be difficult to pass, but I passed it on my first try last week. killexams.com questions and answers guided me correctly, and I was well-organized. My recommendation to other students is to not take this exam lightly and to prepare well. |
User: Lavra***** Passing the jn0-664 exam was long overdue for me, as my career development was associated with it, but I was always scared of the tough situation. Until I discovered the questions and answers provided by Killexams.com, which made me feel more secure. Going through the materials was no issue at all, thanks to the clear method of presenting the topics and the fast and specific answers, which helped me grasp the difficult concepts. I passed nicely and got my promotion, all thanks to Killexams.com. |
Features of iPass4sure JN0-664 Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 133 Q&A
Get Full VersionAll Juniper Exams
Juniper ExamsCertification and Entry Test Exams
Complete exam list