PrepAway - Latest Free Exam Questions & Answers

Tag: JN0-643 (September 7, 2012)

Juniper Networks Certified Internet Professional (JNCIP-ENT) (September 7, 2012)

Which bridge is the root for CIST?

Refer to the Exhibit.

Sw-1 and Sw-2 as shown in the exhibit are configured as follows:

Sw-1

admin@Sw-1# show

configuration-name juniper;

revision-level 1;

bridge-priority 4k;

msti 1 {

vlan 10;

}

msti 2 {

vlan 20;

}

Sw-2

configuration-name juniper;

revision-level 1;

bridge-priority 8k;

msti 1 {

vlan [ 10 15 ];

}

msti 2 {

vlan 20;

}

Which bridge is the root for CIST?

Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

A company’s security policy does not allow outside computers or smart phones into their work areas. All company-provided computers are strictly controlled using 802.1X authentication on all of their switches. All computers obtain DHCP IP addresses from centralized servers and all switches have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.

Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?

Which action resolves the Layer 2 loop while maintaining backup connectivity?

Refer to the Exhibit.

In the exhibit, the enterprise is running RSTP on all switches in its network and is currently experiencing Layer 2 loops. The primary link is between switch 1 and switch 2. For redundancy, a secondary Layer 2 link is purchased from the provider. The provider uses Q-in-Q tunneling to transport the enterprise’s Layer 2 frames.

Which action resolves the Layer 2 loop while maintaining backup connectivity?

Which BGP capability must be negotiated on the BGP session for R2 to install the routes accepted by the new po

Refer to the Exhibit.

In the exhibit, an EBGP session is currently established between R1 and R2. R2 changes its import policy to accept 10 of the routes it previously denied from R1.Which BGP capability must be negotiated on the BGP session for R2 to install the routes accepted by the new policy?

1X authentication protocol is required?

A company is deploying a new 802.1X port-based security infrastructure to allow users to access resources through wired Ethernet ports. However they recently deployed an RSA token-based system for users to connect remotely. The network administrator wants to reuse the same security database for 802.1X port-based security.

Which 802.1X authentication protocol is required?

Based on the configuration, which option prioritizes call-sig traffic over critical traffic?

A network administrator is configuring CoS on a switch and assigns forwarding classes call-sig and critical to the same queue number per the configuration below:

class-of-service {

forwarding-classes {

class best-effort queue-num 0;

class bulk-data queue-num 1;

class critical queue-num 3;

class voice queue-num 6;

class call-sig queue-num 3;

}

}

Based on the configuration, which option prioritizes call-sig traffic over critical traffic?


Page 10 of 11« First...7891011