QUESTION 22 You created a firewall rule to protect the Routing Engine. After applying the rule, your OSPF adjacencies dropped. How would you solve this problem?
A. Create a firewall term that allows IP protocol 89. B. Define a router ID under the [edit routing-options] hierarchy. C. Configure the loopback interface under the [edit protocols ospf] hierarchy. D. Apply the firewall filter to the physical ports.
QUESTION 23 Click the exhibit.
Where is the policy shown in the exhibit enforced?
A. Between the RIB-LOCAL and the RIB-OUT tables B. Between the RIB-OUT table and the BGP peer C. Between the RIB-IN and the RIB-LOCAL tables D. Between the BGP peer and the RIB-In table
QUESTION 24 You want to implement an RP in your PIM sparse mode environment, you are considering the advantages and disadvantages of the various RP election methods. In this scenario, which three implementation guidelines are correct? (Choose three.)
A. The auto-RP method requires using two PIM dense mode groups from the 323/8 range. B. The auto-RP method includes the ability to maintain a backup RP. C. With the bootstrap method, the primary criterion for electing a BSR is priority value. D. When multiple election methods are implemented on a device, the static method is preferred. E. The static method requires configuration on all devices in the PIM domain.
QUESTION 25 Click the Exhibit.
The Receiver is attempting to join two different groups, one from each source. You want to endure that load balancing is taking place. Referring to the exhibit, which statement is true?
A. R4 must have join-load-balance configured under protocol PIM. B. R2 must have join-load-balance configured under protocol PIM. C. R1 must have join-load-balance configured under protocol PIM. D. R3 must have join-load-balance configured under protocol PIM.
QUESTION 26 Click the Exhibit.
Switch 4 is rebooted as shown in the exhibit. Which statement is correct in this scenario?
A. CIST is reconverged. B. MSTI-1 is reconverged. C. CIST generates notification events. D. MSTI-2 is reconverged.
QUESTION 27 What are two OSPF LSA types? (Choose two.)
A. Stub B. Router C. Transit D. Network
QUESTION 28 Click the Exhibit.
You have a workstation and VoIP phone connected to port ge-0/0/1 on an access switch. Referring to the configuration shown in the exhibit, which statement is true?
A. The phone will require a manual VLAN ID configuration. B. Untagged frames that enter the switch on interface ge-0/0/1 will be dropped. C. All frames that leave the switch on interface ge-0/0/1 will be dropped. D. The phone will not be able to communicate over the network.
QUESTION 29 Click the Exhibit.
The ping command shows that connectivity of the 200.0.1/24 network to the 126.96.36.199/24 network exists. You notice that all the ping test results from various devices on 188.8.131.52/24 follow the same path even through equal cost paths exist to the 184.108.40.206/24 network. Referring to the exhibit, what is happening?
A. Load balancing needs to be enabled for equal cost pathing to work. B. The rip-exp policy needs to be modified to advertise RIP routes C. The RIP group must include the preference statement. D. RIPv2 does not support load balancing static routes.
QUESTION 30 Which statement is correct about CoS policers on Junos devices?
A. Traffic that exceeds a policer’s traffic profile can be dropped or assigned to a specific drop profile. B. A policer can assign in-profile traffic to a specific forwarding class. C. A policer does not alter in-profile traffic. D. Policers can be configured to buffer traffic that exceeds the policer’s traffic profile.
QUESTION 31 Click the Exhibit.
You have deployed the access control configuration to the distribution switch. Referring to the exhibit, which statement is true?
A. All hosts connected to the access switch require authentication to access the network. B. All hosts connected to the access switch will have access to the network after one host authenticates. C. All hosts connected to the access switch will have access to the network without authentication. D. Only the first host to authenticate will have access to the network, other hosts will be blocked.
QUESTION 32 Click the Exhibit.
Referring to the exhibit, traffic from User-1 is being forwarded to Server-1 with DSCP values that must be written. You must maintain the rewritten DSCP values throughout the network. Which statement is correct in this scenario?
A. At a minimum, you must rewrite the DSCP values on R1. B. At a minimum, you must rewrite the DSCP values on R1 and R4. C. At a minimum, you must rewrite the DSCP values on R1, R2, and R3. D. At a minimum, you must rewrite the DSCP values on R4.