3 Months Free Update
3 Months Free Update
3 Months Free Update
A Layer 2 connection does not expend across data centers. The IP subnet in a Layer 2 domain is confined within a single data center.
Which EVPN route type is used to communicate prefixes between the data centers?
A modified deficit round-robin scheduler is defined by which three variables? (Choose three.)
You are troubleshooting a BGP connection.
Referring to the exhibit, which two statements are correct? (Choose two.)
You are using 802.1X authentication in your network to secure all ports. You have a printer that does not support 802.1X and you must ensure that traffic is allowed to and from this printer without authentication.
In this scenario, what will satisfy the requirement?
In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received?
Your enterprise network uses routing instances to support multitenancy. Your Junos devices use BGP to peer to multiple BGP devices. You must ensure that load balancing is achieved within the routing instance.
Which two statements would accomplish this task? (Choose two.)
You enable the Multiple VLAN Registration Protocol (MVRP) to automate the creation and management of virtual LANs.
Which statement is correct in this scenario?
You are asked to troubleshoot voice quality issues on your newly implement VoIP network. You notice that the voice packets are being dropped. You have verified that the packets are correctly marked for expedited forwarding queue.
Referring to the exhibit, what must you configure to solve the problem?
You must provide network connectivity to hosts that fail authentication.
In this scenario, what would be used in a network secured with 802.1X to satisfy this requirement?
A user is attempting to watch a high-definition video being streamed from the media server over the network. However, the user complains that the experienced video quality is poor. While logged on to router B, a Juniper Networks device, you notice that video packets are being dropped.
In this scenario, what would solve this problem?
When using wide metrics, which two statements about route advertisement between IS-IS levels are correct? (Choose two.)
You are asked to establish interface level authentication for users connecting to your network. You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability.
Which authentication method would satisfy this requirement?
You recently committed a change to a router to reject OSPF routes sourced from area 10. However, you are still seeing area 10 routes in the routing table.
Referring to the exhibit, which statement is correct?