Juniper JN0-661 Exam Practice Questions (P. 3)
- Full Access (65 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Your customer requires a Layer 2 VPN service (draft-kompella-mpls-l2vpn). You are asked to describe the operational requirements on the PE router supporting this service.
Which two statements are true in this scenario? (Choose two.)
Which two statements are true in this scenario? (Choose two.)
- AThe ingress PE router associates multiple MPLS labels with the corresponding traffic flows.
- BThe ingress PE router for a traffic flow maintains the data-link connection identifier.
- CThe ingress PE router for a traffic flow removes the data-link connection identifier.
- DThe ingress PE router associates a single MPLS label with the corresponding traffic flows.
Correct Answer:
AC
A: When a packet arrives at a PE from a CE in a Layer 2 VPN, the Layer 2 address of the packet identifies to which remote attachment circuit (and thus remote
CE) the packet is destined. The procedure installs a route that maps the Layer 2 address to a tunnel (which identifies the PE to which the destination CE is attached) and a VPN label (which identifies the destination AC). If the egress PE is the same as the ingress PE, no tunnel or VPN label is needed.
C: In case of IP-only Layer 2 interworking, the Layer 2 header is completely stripped off till the IP header.
References:
https://tools.ietf.org/html/draft-kompella-l2vpn-l2vpn-10
AC
A: When a packet arrives at a PE from a CE in a Layer 2 VPN, the Layer 2 address of the packet identifies to which remote attachment circuit (and thus remote
CE) the packet is destined. The procedure installs a route that maps the Layer 2 address to a tunnel (which identifies the PE to which the destination CE is attached) and a VPN label (which identifies the destination AC). If the egress PE is the same as the ingress PE, no tunnel or VPN label is needed.
C: In case of IP-only Layer 2 interworking, the Layer 2 header is completely stripped off till the IP header.
References:
https://tools.ietf.org/html/draft-kompella-l2vpn-l2vpn-10
send
light_mode
delete
Question #12
During a network migration window, an engineer issues the set protocols isis overload timeout 1200 command.
In this scenario, which effect does this have on the IS-IS operations of the router?
In this scenario, which effect does this have on the IS-IS operations of the router?
- AAfter the first IS-IS adjacency forms, the overload bit is set for 1200 seconds.
- BWhen the IS-IS protocol starts, the overload bit is set after the timer of 1200 seconds expires.
- CWhen the IS-IS protocol starts, the overload bit is set for 1200 seconds.
- DAfter the first IS-IS adjacency forms, the overload bit is set after the timer of 1200 seconds expires.
Correct Answer:
C
With a timeout, overload mode is set if the time elapsed since the IS-IS instance started is less than the specified timeout.
To specify the number of seconds at which overload is reset, include the timeout option when specifying the overload statement: overload timeout seconds;
The time can range from 60 through 1800 seconds.
References:
http://www.juniper.net/documentation/en_US/junos12.1x47/topics/usage-guidelines/routing-configuring-is-is-to-make-routers-appear-overloaded.html
C
With a timeout, overload mode is set if the time elapsed since the IS-IS instance started is less than the specified timeout.
To specify the number of seconds at which overload is reset, include the timeout option when specifying the overload statement: overload timeout seconds;
The time can range from 60 through 1800 seconds.
References:
http://www.juniper.net/documentation/en_US/junos12.1x47/topics/usage-guidelines/routing-configuring-is-is-to-make-routers-appear-overloaded.html
send
light_mode
delete
Question #13
What is the final component of CoS processing on a Junos device?
- Adrop profile map
- Bbehavior aggregate classifier
- Crewrite marker
- Dmultifield classifier
Correct Answer:
C
The following steps describe the CoS process:
1. A logical interface has one or more classifiers of different types applied to it.
2. The classifier assigns the packet to a forwarding class and a loss priority
3. Each forwarding class is assigned to a queue
4. Input (and output) policers meter traffic and might change the forwarding class and loss priority if a traffic flow exceeds its service level.
5. The physical or logical interface has a scheduler map applied to it
6. The scheduler defines how traffic is treated in the output queuefor example, the transmit rate, buffer size, priority, and drop profile
7. The scheduler map assigns a scheduler to each forwarding class (
8. The drop-profile defines how aggressively to drop packets that are using a particular scheduler
9. The rewrite rule takes effect as the packet leaves a logical interface that has a rewrite rule configured. The rewrite rule writes information to the packet (for example, EXP or DSCP bits) according to the forwarding class and loss priority of the packet.
References:
http://www.juniper.net/documentation/en_US/junos16.1/topics/concept/packet-flow-cos-process-cos-config-guide.html
C
The following steps describe the CoS process:
1. A logical interface has one or more classifiers of different types applied to it.
2. The classifier assigns the packet to a forwarding class and a loss priority
3. Each forwarding class is assigned to a queue
4. Input (and output) policers meter traffic and might change the forwarding class and loss priority if a traffic flow exceeds its service level.
5. The physical or logical interface has a scheduler map applied to it
6. The scheduler defines how traffic is treated in the output queuefor example, the transmit rate, buffer size, priority, and drop profile
7. The scheduler map assigns a scheduler to each forwarding class (
8. The drop-profile defines how aggressively to drop packets that are using a particular scheduler
9. The rewrite rule takes effect as the packet leaves a logical interface that has a rewrite rule configured. The rewrite rule writes information to the packet (for example, EXP or DSCP bits) according to the forwarding class and loss priority of the packet.
References:
http://www.juniper.net/documentation/en_US/junos16.1/topics/concept/packet-flow-cos-process-cos-config-guide.html
send
light_mode
delete
Question #14
Which two statements are true about IS-IS adjacency formation? (Choose two.)
- ALevel 1 only routers never form an adjacency with Level 2 only routers.
- BLevel 1 only routers always form an adjacency with Level 2 only routers.
- CFor Level 1 adjacencies, area IDs must be the same.
- DFor Level 2 adjacencies, area IDs must be the same.
Correct Answer:
AC
An L1 router does not form an adjacency with an L2 router, regardless of area.
L1 routers form L1 adjacencies with L1 and L1-L2 routers in their area.
L2 routers form L2 adjacencies with L2 and L1-L2 routers in their area or another area.
References:
http://www.ciscopress.com/articles/article.asp?p=730191&seqNum=7
AC
An L1 router does not form an adjacency with an L2 router, regardless of area.
L1 routers form L1 adjacencies with L1 and L1-L2 routers in their area.
L2 routers form L2 adjacencies with L2 and L1-L2 routers in their area or another area.
References:
http://www.ciscopress.com/articles/article.asp?p=730191&seqNum=7
send
light_mode
delete
Question #15
Which address range has been specifically reserved for use with SSM traffic?
- A233.0.0.0/8
- B224.2.0.0/16
- C232.0.0.0/8
- D239.0.0.0/8
Correct Answer:
C
Source-Specific Multicast (SSM) Group address range is 224/4, but it is guaranteed only for 232/8.
References:
https://www.juniper.net/documentation/en_US/junos15.1x49/topics/topic-map/mcast-ssm.html
C
Source-Specific Multicast (SSM) Group address range is 224/4, but it is guaranteed only for 232/8.
References:
https://www.juniper.net/documentation/en_US/junos15.1x49/topics/topic-map/mcast-ssm.html
send
light_mode
delete
All Pages