PrepAway - Latest Free Exam Questions & Answers

Category: JN0-643 (v.2)

Exam JN0-643: Juniper Networks Certified Internet Professional (JNCIP-ENT) (update June 23th, 2013)

which option prioritizes call-sig traffic over critical traffic?

A network administrator is configuring CoS on a switch and assigns forwarding classes call-sig
and critical to the same queue number per the configuration below:
class-of-service {
forwarding-classes {
class best-effort queue-num 0;
class bulk-data queue-num 1;
class critical queue-num 3;
class voice queue-num 6;
class call-sig queue-num 3;
}
}
Based on the configuration, which option prioritizes call-sig traffic over critical traffic?

Which 802.1X authentication protocol is required?

A company is deploying a new 802.1X port-based security infrastructure to allow users to access
resources through wired Ethernet ports. However they recently deployed an RSA token-based
system for users to connect remotely. The network administrator wants to reuse the same security

database for 802.1X port-based security.
Which 802.1X authentication protocol is required?

Which BGP capability must be negotiated on the BGP session for R2 to install the routes accepted by the new po

Refer to the Exhibit.

In the exhibit, an EBGP session is currently established between R1 and R2. R2 changes its
import policy to accept 10 of the routes it previously denied from R1.Which BGP capability must be
negotiated on the BGP session for R2 to install the routes accepted by the new policy?

Which action resolves the Layer 2 loop while maintaining backup connectivity?

Refer to the Exhibit.

In the exhibit, the enterprise is running RSTP on all switches in its network and is currently
experiencing Layer 2 loops. The primary link is between switch 1 and switch 2. For redundancy, a
secondary Layer 2 link is purchased from the provider. The provider uses Q-in-Q tunneling to
transport the enterprise’s Layer 2 frames.
Which action resolves the Layer 2 loop while maintaining backup connectivity?

Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

A company’s security policy does not allow outside computers or smart phones into their work
areas. All company-provided computers are strictly controlled using 802.1X authentication on all of
their switches. All computers obtain DHCP IP addresses from centralized servers and all switches
have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?


Page 11 of 12« First...89101112