Which command would you use to verify the presence of VPN routes on a PE device?
Which command would you use to verify the presence of VPN routes on a PE device?
Which two statements correctly describe the expected behavior if the primary RE fails?
You have recently installed a second Routing Engine (RE) in your router
Which two statements correctly describe the expected behavior if the primary RE fails?
(Choose two.)
which two BGP attributes would you modify to accomplish this goal?
You want to influence how traffic enters your network
Using industry best practices, which two BGP attributes would you modify to accomplish this goal? (Choose two)
Which two elements contribute to the bridge ID when configuring RSTP?
Which two elements contribute to the bridge ID when configuring RSTP? (Choose 2)
Which two statements about BGP are accurate?
Which two statements about BGP are accurate? (Choose two.)
Which two BGP attributes are modified by default when they are passed between external BGP peers?
Which two BGP attributes are modified by default when they are passed between external BGP peers? (Choose two)
Which prefix would your ISP likely allocate to your network?
You own a home network connecting through an always-on connection and need to assign IPv6 addresses to your routers because you want to follow the guidelines spelled out in RFC 3177. you want to design your network with the correct prefixes.
Which prefix would your ISP likely allocate to your network?
what is true regarding an external BGP session?
Using industry best practices, what is true regarding an external BGP session?
Which two statements reflect potential causes for this issue?
You have configured MPLS and RSVP in your network using all of the Junos defaults. You established an LSP in your network which is reporting an up status but no traffic is using it.
Which two statements reflect potential causes for this issue? (Choose two)
Which type of protocol would you consider in your design?
You are asked to design a Layer 2 switched topology that can automatically recover from link failures.
Which type of protocol would you consider in your design?