Weekend Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

JN0-649 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

JN0-649 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Enterprise Routing and Switching Professional (JNCIP-ENT)
  • Last Update: Sep 15, 2024
  • Questions and Answers: 65
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

JN0-649 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

JN0-649 Practice Exam Questions with Answers Enterprise Routing and Switching Professional (JNCIP-ENT) Certification

Question # 6

A Layer 2 connection does not expend across data centers. The IP subnet in a Layer 2 domain is confined within a single data center.

Which EVPN route type is used to communicate prefixes between the data centers?

A.

Type 1

B.

Type 2

C.

Type 4

D.

Type 5

Full Access
Question # 7

A modified deficit round-robin scheduler is defined by which three variables? (Choose three.)

A.

priority

B.

WRED

C.

transmit rate

D.

Layer 3 fields

E.

buffer size

Full Access
Question # 8

You are troubleshooting a BGP connection.

Referring to the exhibit, which two statements are correct? (Choose two.)

JN0-649 question answer

A.

Packet fragmentation is preventing the session from establishing.

B.

The 192.168.1.5 peer has a misconfigured MD5 key.

C.

The ge-0/0/1 interface is disabled.

D.

The 192.168.1.4 peer has a misconfigured autonomous system number.

Full Access
Question # 9

You are using 802.1X authentication in your network to secure all ports. You have a printer that does not support 802.1X and you must ensure that traffic is allowed to and from this printer without authentication.

In this scenario, what will satisfy the requirement?

A.

MAC filtering

B.

MACsec

C.

static MAC bypass

D.

MAC RADIUS

Full Access
Question # 10

In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received?

A.

LSA flooding guarantees that all routers will receive them successfully.

B.

LSAs are sent over a TCP connection.

C.

LSAs are acknowledged by the neighboring router.

D.

LSAs are advertised with an acknowledgement bit.

Full Access
Question # 11

Your enterprise network uses routing instances to support multitenancy. Your Junos devices use BGP to peer to multiple BGP devices. You must ensure that load balancing is achieved within the routing instance.

Which two statements would accomplish this task? (Choose two.)

A.

Configure the multipath option at the [edit protocols bgp group neighbor] hierarchy.

B.

Configure the multipath option at the [edit protocols bgp group] hierarchy.

C.

Configure a load-balance per-packet policy and apply it at the [edit routing-options forwarding-table] hierarchy.

D.

Configure the multipath option at the [edit routing-instances routing-options] hierarchy.

Full Access
Question # 12

Referring to the exhibit, which two statements are correct? (Choose two.)

JN0-649 question answer

A.

BPDUs from the root bridge for VLAN 10 have been received on the ge-0/0/7.0 interface.

B.

DS-1 is the root bridge for VLAN 10.

C.

BPDUs from the root bridge for VLAN 20 have been received on the ge-0/0/7.0 interface.

D.

Default VSTP bridge priority values are configured.

Full Access
Question # 13

You enable the Multiple VLAN Registration Protocol (MVRP) to automate the creation and management of virtual LANs.

Which statement is correct in this scenario?

A.

The forbidden mode does not register or declare VLANs.

B.

When enabled, MVRP affects all interfaces.

C.

Timers dictate when link state changes are propagated.

D.

MVRP works with RSTP and VSTP.

Full Access
Question # 14

You are asked to troubleshoot voice quality issues on your newly implement VoIP network. You notice that the voice packets are being dropped. You have verified that the packets are correctly marked for expedited forwarding queue.

Referring to the exhibit, what must you configure to solve the problem?

JN0-649 question answer

JN0-649 question answer

JN0-649 question answer

JN0-649 question answer

JN0-649 question answer

A.

You must configure a multifield classifier to put the VoIP traffic in the correct queue.

B.

You must configure a rewrite rule to ensure that the traffic is scheduled properly in the device.

C.

You must configure a scheduler to allocate bandwidth to the expedited forwarding queue.

D.

You must configure a policer to ensure that the queue is not being starved.

Full Access
Question # 15

You must provide network connectivity to hosts that fail authentication.

In this scenario, what would be used in a network secured with 802.1X to satisfy this requirement?

A.

Configure the native-vlan-id parameter on the port.

B.

Use the server-reject-vlan command to specify a guest VLAN.

C.

Configure a secondary IP address on the port for unauthenticated hosts.

D.

Configure the port as a spanning tree edge port.

Full Access
Question # 16

A user is attempting to watch a high-definition video being streamed from the media server over the network. However, the user complains that the experienced video quality is poor. While logged on to router B, a Juniper Networks device, you notice that video packets are being dropped.

In this scenario, what would solve this problem?

JN0-649 question answer

A.

Adjust the scheduler for the expedited-forwarding forwarding class to support a higher transmit rate.

B.

Adjust the expedited-forwarding BA classifier to router B's ge-0/0/0 interface to support a higher transmit rate.

C.

Adjust the scheduler-map to support a higher transmit rate.

D.

Adjust the expedited-forwarding BA classifier on router B's ge-0/0/1 interface to support a higher transmit rate.

Full Access
Question # 17

When using wide metrics, which two statements about route advertisement between IS-IS levels are correct? (Choose two.)

A.

Level 1 and Level 2 routers do not advertise Level 2 routes into the Level 1 area by default.

B.

Level 1 routes are advertised to Level 2 routers by default.

C.

If wide-metrics-only is configured, Level 1 routes are not advertised to Level 2 routers by default.

D.

Level 1 routes advertised as external routes into Level 1 are not advertised to any Level 2 routers by default.

Full Access
Question # 18

You are asked to establish interface level authentication for users connecting to your network. You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability.

Which authentication method would satisfy this requirement?

A.

MAC RADIUS

B.

captive portal

C.

802.1X with single-secure supplicant mode

D.

802.1X with multiple supplicant mode

Full Access
Question # 19

You recently committed a change to a router to reject OSPF routes sourced from area 10. However, you are still seeing area 10 routes in the routing table.

Referring to the exhibit, which statement is correct?

JN0-649 question answer

A.

The OSPF protocol is first matched by find-ospf and accepted.

B.

The routes only timeout after 24 hours.

C.

The routes remain in the table until the device is rebooted.

D.

The routes remain in the table until the routing daemon is restarted.

Full Access