当前分类: JN0-303
问题:单选题What setting in JUNOS software forces a bgp speaker to wait for a bgp neighbor to initiate a bgp session?()A waitB holdC passiveD authenticate...
查看答案
问题:多选题Which two IS-IS hello values must match to form a Level 1 IS-IS adjacency?()AAFIBAreaCSystem IDDN-Selector...
问题:多选题Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()ATLV 22 supports wide metrics.BTLV 2 is only used in Level 1 routers.CTLV 22 displays the neighbor’s extended areas.DOnly TLV 22 can support the...
问题:多选题Which three pre-conditions must be met before an OSPF router can perform graceful restart?()ARouter must be ABRBRouter must contain one sham link.CThe network topology must be stable.DRouter must be able to forward packets.ENeighbors must support grace...
问题:单选题Which action occurs when the BGP route 20.1.0.0/16 is evaluated by the policy expression?() [editpolicy-options] policy-statementmy-filter { term-first{ from{ route-filter192.168.0.0/16orlongeraccept; route-filter 192.168.1.0/24 exact accept; rou...
问题:单选题Within a BGP confederation, how are routing loops avoided?()A Split horizon.B AS confederation sequence.C The BFP cluster ID attribute.D The BGP originator ID attribute....
问题:多选题What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()AMBGPBRIB groupsCRouting policyDFirewall filters...
问题:单选题Which statement is true about Kompella-based and Martina-based VPNs?()A Both use LDPB Both use BGPC Both require additional hardware.D Both use a two-label stack for forwarding....
问题:多选题What are three examples of a provider-provisioned VPN supported by JUNOS software?()AL2FBPPTPCCircuit cross-connectDDraft-Martini-based VPNsEDraft-Kompella-based VPNs...
问题:单选题How is a tie broken in Auto-RP?()A Lowest IP addressB Highest IP addressC Lowest MAC addressD Highest MAC address...
问题:多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDUnauthenticatedESimple password...
问题:多选题Firewall filter policers can perform which two actions?()ASet the next hop.BDiscard packets.CSet the loss priority.DSample the packet content....
问题:单选题What is the maximum metric value that can be reported in a narrow metric TLV?()A 63B 64C 1023D 1024E 65535...
问题:单选题Which statement would prevent the sending of redundant route advertisements when your route reflector cluster is fully meshed?()A set protocolbgpgroupmygrouppath-selectioncisco-non-deterministic;B set protocolbgpgroup i-bgp n-aggreator-id;C set protoco...
问题:单选题How is the cost of a virtual link in OSFP calculated?()A Takes the metric of the outgoing interface.B Uses the metric that is assigned during configuration.C Uses the path metric to reach the virtual neighbor.D Uses a default of zero unless otherwise s...
问题:单选题Which is a step in the JUNOS software CSPF algorithm?()A Prune links that are bidirectional.B Eliminate paths with insufficient MTUC Eliminate paths of more than 15 hops.D Prune links that do not contain the included administrative group....
问题:单选题Routers A and B are connected with a point-to-point OC-3 interface. Each router’s OC-3 interface is configured for both Level 1 and Level 2. The routers are configured in different areas.How many IS-IS adjacencies exist between the two routers?()A 0B 1...
问题:单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A an LSP for each local CE deviceB an LSP for each remote PE deviceC an LSP for each remote CE deviceD an LSP for each ...
问题:单选题In JUNOS software, what is required to dedistribute RIP routes into OSPF?()A Apply an export policy in RIPB Apply an import policy in RIPC Apply an export policy in OSPFD Apply an import policy in OSPF...