问题:多选题What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()AMBGPBRIB groupsCRouting policyDFirewall filters
查看答案
问题:单选题Which LSA is the Type 10?()A Router LSAB Opaque LSAC AS attributes LSAD ASBR summary LSAE Network summary LSA
问题:单选题In JUNOS software, what is required to dedistribute RIP routes into OSPF?()A Apply an export policy in RIPB Apply an import policy in RIPC Apply an export policy in OSPFD Apply an import policy in OSPF
问题:多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors
问题:多选题Which two statements are true when configuring a domain-id?()AThe default OSPF domain-id is 127.0.0.1.BIt most cases, a domain-id must be configured.CIt most cases, you do not need to configure a domain-id.DFor a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help control LSA translations.
问题:多选题Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()ATLV 22 supports wide metrics.BTLV 2 is only used in Level 1 routers.CTLV 22 displays the neighbor’s extended areas.DOnly TLV 22 can support the inclusion of sub-TLVs.EOnly TLV 22 can be flooded across L1/L2 boundaries.
问题:多选题In which two ways can you influence how downstream LSRs treat MPLS traffic?()AUse an EXP rewrite table.BUse a DSCP rewrite table.CStatically assign a CoS value to an LDP-signaled LSPDStatically assign a CoS value to an RSVP-signlated LSP
问题:单选题Which statement would prevent the sending of redundant route advertisements when your route reflector cluster is fully meshed?()A set protocolbgpgroupmygrouppath-selectioncisco-non-deterministic;B set protocolbgpgroup i-bgp n-aggreator-id;C set protocolbgpgroupmygroup no-client-reflect;D set protocolbgpgroup i-bgp damping
问题:单选题What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A Nothing, wide metrics are used by default in IS-ISB Enable wide-metrics-only under protocol IS-ISC Enable traffic-engineering under protocols IS-ISD Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).
问题:单选题How is a tie broken in Auto-RP?()A Lowest IP addressB Highest IP addressC Lowest MAC addressD Highest MAC address
问题:单选题Which action occurs when the BGP route 20.1.0.0/16 is evaluated by the policy expression?() [editpolicy-options] policy-statementmy-filter { term-first{ from{ route-filter192.168.0.0/16orlongeraccept; route-filter 192.168.1.0/24 exact accept; route-filter 192.168.2.0/24 exact; } then{ metric10; accept; } termsecond { then{ metric20; accept; }} policy-statementmain { termchange-attributes from{ policymy-filter; } thenaccept; } termdefault { thenreject; }} [editprotocols] bgp{ exportmain; }A The route is not advertised into BGPB The route is advertised into BGP with metric 10.C The route is advertised into BGP with metric 20.D The route is advertised into BGP with default metric.
问题:多选题What are two commands that can be used to configure MBGP for multicast?()AUnder the BGP group, configure family inet anyBUse the set protocol MBGP command to enable MBGPCUnder the BGP group, configure family inet multicastDUse the set rib-group command to copy the multicast routes into inet.1
问题:多选题What are three examples of a provider-provisioned VPN supported by JUNOS software?()AL2FBPPTPCCircuit cross-connectDDraft-Martini-based VPNsEDraft-Kompella-based VPNs
问题:单选题Into which protocol are LDP hello messages encapsulated?()A IPB TCPC UDPD MPLS
问题:多选题Which two are default preference values for both internal and external IS-IS Level 2 routes on a Juniper Networks router?()A10B15C18D150E160F165
问题:多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDUnauthenticatedESimple password
问题:多选题Firewall filter policers can perform which two actions?()ASet the next hop.BDiscard packets.CSet the loss priority.DSample the packet content.
问题:单选题Within a BGP confederation, how are routing loops avoided?()A Split horizon.B AS confederation sequence.C The BFP cluster ID attribute.D The BGP originator ID attribute.
问题:多选题Which two IS-IS hello values must match to form a Level 1 IS-IS adjacency?()AAFIBAreaCSystem IDDN-Selector