Juniper JN0-351 Exam Practice Questions (P. 3)
- Full Access (107 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
You are configuring an IS-IS IGP network and do not see the IS-IS adjacencies established.
In this scenario, what are two reasons for this problem? (Choose two.)
In this scenario, what are two reasons for this problem? (Choose two.)
- AMTU is not at least 1492 bytes.Most Voted
- BIP subnets are not a /30 address.
- CThe Level 2 routers have mismatched areas.
- DThe Io0 interface is not included as an IS-IS interface.Most Voted
Correct Answer:
AD
AD

Definitely, keep in mind that IS-IS adjacencies require attention to the MTU settings and the inclusion of the correct interfaces. For IS-IS to form adjacencies effectively, the MTU setting needs to be at least 1492 bytes. This ensures packets aren't dropped due to size mismatches which disrupts communication. Moreover, including Loopback 0 in IS-IS interfaces is crucial. Loopback interfaces typically provide a stable identifier for the router that remains consistent even if other interfaces go down, aiding in continuous IS-IS operation. Missing out on these configurations can stop IS-IS adjacencies from forming.
send
light_mode
delete
Question #12
You are asked to create a new firewall filter to evaluate Layer 3 traffic that is being sent between VLANs.
In this scenario, which two statements are correct? (Choose two.)
In this scenario, which two statements are correct? (Choose two.)
- AYou should create a family Ethernet-switching firewall filter with the appropriate match criteria and actions.
- BYou should apply the firewall filter to the appropriate VLAN.
- CYou should create a family inet firewall filter with the appropriate match criteria and actions.Most Voted
- DYou should apply the firewall filter to the appropriate IRB interface.Most Voted
Correct Answer:
CD
CD

When configuring Layer 3 traffic controls between VLANs, it's most effective to use a family inet firewall filter, as this is specifically designed for processing IPv4 and IPv6 traffic. Remember, once the filter is set up, applying it to the appropriate IRB interface is crucial—it plays a central role in controlling inter-VLAN routing. This ensures that the filters are applied where Layer 3 decisions are made, rather than just at the Ethernet-switching level where only Layer 2 decisions occur.
send
light_mode
delete
Question #13

You are a network operator troubleshooting BGP connectivity.
Which two statements are correct about the output shown in the exhibit? (Choose two.)
- APeer 10.32.1.2 is configured for AS 63645.
- BThe BGP session is not established.
- CThe R1 is configured for AS 65400.Most Voted
- DThe routers are exchanging IPv4 routes.Most Voted
Correct Answer:
AD
AD
send
light_mode
delete
Question #14
What is the maximum allowable MTU size for a default GRE tunnel without IPv4 traffic fragmentation?
- A1496 bytes
- B1480 bytes
- C1500 bytes
- D1476 bytesMost Voted
Correct Answer:
B
B

Indeed, the correct answer is B) 1480 bytes. Often there's a mix-up due to the distinction between the Ethernet MTU and the MTU within a GRE tunnel. A standard Ethernet frame can hold up to 1500 bytes, but when a GRE tunnel is established, you need room for the GRE and IP headers—24 bytes in total (4 bytes for GRE and 20 for the IP header). Thus, to avoid fragmentation within the tunnel, the encapsulated data must not exceed 1480 bytes. If the data is larger, prior to GRE encapsulation, it would necessitate fragmentation to fit within the standard Ethernet frame on the physical network.
send
light_mode
delete
Question #15
You are troubleshooting a BGP routing issue between your network and a customer router and are reviewing the BGP routing policies.
Which two statements are correct in this scenario? (Choose two.)
Which two statements are correct in this scenario? (Choose two.)
- AExport policies are applied to routes in the RIB-In table.
- BImport policies are applied to routes in the RIB-Local table.
- CImport policies are applied after the RIB-In table.Most Voted
- DExport policies are applied after the RIB-Local table.Most Voted
Correct Answer:
CD
CD

The correct understanding of BGP routing in this context hinges on recognizing that import policies modify and install the routes they process into the RIB-Local table immediately following their reception in the RIB-In. This is the typical path: routes are received from BGP peers, entered into the RIB-In, subjected to the import policies, and then transitioned into the RIB-Local. Export policies, on the other hand, are applied to routes after they have already been installed in the RIB-Local, effectively preparing them as RIB-Out to be shared with BGP peers. This sequential understanding is crucial for effectively managing and troubleshooting BGP routing policies.
send
light_mode
delete
All Pages