Which two routing tables are checked during this process in a default Junos configuration? (Choose two
During the BGP route-resolution process, the Junos OS must calculate the appropriate next-hop based on the BGP protocol next-hop attribute.
Which two routing tables are checked during this process in a default Junos configuration? (Choose two.)
Which two actions should you implement for a Private VLAN? (Choose two
You are adding ports to a Private VLAN on a standalone EX Series switch so that you can control access between the sales and finance departments.
Which two actions should you implement for a Private VLAN? (Choose two.)
Which CLI command verifies that STP BPDUs are being tunneled?
You have configured L2TP on VLAN blue.
Which CLI command verifies that STP BPDUs are being tunneled?
Which bridge is the root for CIST?
Refer to the Exhibit.
Sw-1 and Sw-2 as shown in the exhibit are configured as follows:
Sw-1
admin@Sw-1# show
configuration-name juniper;
revision-level 1;
bridge-priority 4k;
msti 1 {
vlan 10;
}
msti 2 {
vlan 20;
}
Sw-2
configuration-name juniper;
revision-level 1;
bridge-priority 8k;
msti 1 {
vlan [ 10 15 ];
}
msti 2 {
vlan 20;
}
Which bridge is the root for CIST?
Which "Link type" should be displayed in the output?
Which CoS component helps with TCP global synchronization problems?
Which CoS component helps with TCP global synchronization problems?
Which configuration parameter added to switch-1 would allow you to confirm this?
You suspect that a PoE device connected to interface ge-0/0/5 on switch-1 is periodically spiking above 15 W of power consumption.
Which configuration parameter added to switch-1 would allow you to confirm this?
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?
A company’s security policy does not allow outside computers or smart phones into their work areas. All company-provided computers are strictly controlled using 802.1X authentication on all of their switches. All computers obtain DHCP IP addresses from centralized servers and all switches have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?
Which action resolves the Layer 2 loop while maintaining backup connectivity?
Refer to the Exhibit.
In the exhibit, the enterprise is running RSTP on all switches in its network and is currently experiencing Layer 2 loops. The primary link is between switch 1 and switch 2. For redundancy, a secondary Layer 2 link is purchased from the provider. The provider uses Q-in-Q tunneling to transport the enterprise’s Layer 2 frames.
Which action resolves the Layer 2 loop while maintaining backup connectivity?