Question # 1 Which two statements are correct about the customer interface in an LDP-signaled pseudowire? (Choose two) A. When the encapsulation is vlan-ccc or extended-vlan-ccc, the configured VLAN tag is not included in the control plane LDP advertisement B. When the encapsulation is ethernet-ccc, only frames without a VLAN tag are accepted in the data plane C. When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement D. When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.
Click for Answer
C. When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement D. When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.
Answer Description Explanation:
The customer interface in an LDP-signaled pseudowire is the interface on the PE router that connects to the CE device. An LDP-signaled pseudowire is a type of Layer 2 circuit that uses LDP to establish a point-to-point connection between two PE routers over an MPLS network. The customer interface can have different encapsulation types depending on the type of traffic that is carried over the pseudowire. The encapsulation types are ethernet-ccc, vlan-ccc, extended-vlan-ccc, atm-ccc, frame-relay-ccc, ppp-ccc, cisco-hdlc-ccc, and tcc-ccc. Depending on the encapsulation type, the customer interface can accept or reject tagged or untagged frames in the data plane, and include or exclude VLAN tags in the control plane LDP advertisement. The following table summarizes the behavior of different encapsulation types:
Question # 2 You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task? A. Configure the ignore-attached-bit parameter on all L2 routers. B. Configure all routers to allow wide metrics. C. Configure all routers to be L1. D. Configure the ignore-attached-bit parameter on all L1 routers
Click for Answer
D. Configure the ignore-attached-bit parameter on all L1 routers
Answer Description Explanation:
The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1 routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their routing tables.
Question # 3 Which two statements are correct regarding bootstrap messages that are forwarded within a PIM sparse mode domain? (Choose two.) A. Bootstrap messages are forwarded only to routers that explicitly requested the messages within the PIM sparse-mode domain B. Bootstrap messages distribute RP information dynamically during an RP election. C. Bootstrap messages are used to notify which router is the PIM RP D. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.
Click for Answer
B. Bootstrap messages distribute RP information dynamically during an RP election. D. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.
Answer Description Explanation:
Bootstrap messages are PIM messages that are used to distribute rendezvous point (RP) information dynamically during an RP election. Bootstrap messages are sent by bootstrap routers (BSRs), which are routers that are elected to perform the RP discovery function for a PIM sparse-mode domain. Bootstrap messages contain information about candidate RPs and their multicast groups, as well as BSR priority and hash mask length. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain using hop-by-hop flooding.
Question # 4 In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received? A. LSA flooding guarantees that all routers will receive them successfully. B. LSAs are sent over a TCP connection. C. LSAs are acknowledged by the neighboring router. D. LSAs are advertised with an acknowledgement bit.
Click for Answer
C. LSAs are acknowledged by the neighboring router.
Answer Description Explanation:
OSPF Protocol Basics:
OSPF (Open Shortest Path First) is a link-state routing protocol.
Routers exchange LSAs (Link-State Advertisements) to share topology information.
LSA Acknowledgment Mechanism:
OSPF uses a reliable mechanism to ensure LSAs are received.
When a router sends an LSA to a neighbor, it expects an acknowledgment (ACK).
If an ACK is not received within a certain period, the router will retransmit the LSA.
Acknowledgment Process:
LSAs are sent over OSPF's reliable transport, which ensures delivery through acknowledgments.
This mechanism helps to maintain consistent and up-to-date topology databases across routers.
References:
OSPF RFC 2328
Understanding OSPF Operations
Question # 5 You are configuring a Layer 3 VPN between two sites. You are configuring the vrf-target target : 65100:100 statement in your routing instance. In this scenario, which two statements describe the vrf-target configuration? (Choose two.) A. This value is used to identify BGP routes learned from the local CE device. B. This value is used to identify BGP routes learned from the remote PE device. C. This value is used to add a target community to BGP routes advertised to the local CE device. D. This value is used to add a target community to BGP routes advertised to the remote PE device.
Click for Answer
B. This value is used to identify BGP routes learned from the remote PE device. D. This value is used to add a target community to BGP routes advertised to the remote PE device.
Answer Description Explanation:
The `vrf-target` statement in a Layer 3 VPN configuration is used to control the import and export of VPN routes by attaching a target community to the routes. This helps in defining which VPN routes should be imported into or exported from a particular VRF (Virtual Routing and Forwarding) instance.
1. Understanding VRF Target The `vrf-target` statement specifies the extended community attributes (route targets) that are used to control the import and export of routes in a VRF. These attributes help in identifying which routes should be shared between different VRFs, particularly across different PE (Provider Edge) devices.
2. Statements Analysis This value is used to identify BGP routes learned from the local CE device incorrect. The `vrf-target` attribute is not used to identify routes learned from the local CE device. It is used to manage routes between PE devices and within the provider's MPLS network. This value is used to identify BGP routes learned from the remote PE device. Correct. The `vrf-target` value helps in identifying which routes from remote PE devices should be imported into the local VRF. It essentially acts as a filter for importing BGP routes with matching target communities. This value is used to add a target community to BGP routes advertised to the local CE device. Incorrect. Routes advertised to the local CE device do not use the `vrf-target` attribute. Instead, these routes are typically managed within the local VRF routing table. This value is used to add a target community to BGP routes advertised to the remote PE device. Correct. When advertising routes from the local PE to remote PE devices, the `vrf-target` value is added to these routes. This target community ensures that the correct routes are shared across the VPN. Conclusion:
The correct statements about the `vrf-target` configuration in a Layer 3 VPN scenario are:
This value is used to identify BGP routes learned from the remote PE device.
This value is used to add a target community to BGP routes advertised to the remote PE device.
References: Juniper Networks Documentation on VRF Target: [VRF Target Configuration
(https://www.juniper.net/documentation/en_US/junos/topics/topic-map/layer-3-vpns.html) MPLS and VPN Architectures by Ivan Pepelnjak and Jim Guichard
Question # 6 Which two statements are correct about VPLS tunnels? (Choose two.) A. LDP-signaled VPLS tunnels only support control bit 0. B. LDP-signaled VPLS tunnels use auto-discovery to provision sites C. BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers. D. BGP-signaled VPLS tunnels require manual provisioning of sites.
Click for Answer
A. LDP-signaled VPLS tunnels only support control bit 0. C. BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.
Answer Description Explanation:
https://www.juniper.net/documentation/us/en/software/nce/feature-guide-virtual-private-lan-service/topics/task/vpls-ldp-signaling-solutions.html
https://www.juniper.net/documentation/us/en/software/junos/vpn-l2/topics/concept/vpns-configuring-vpls-routing-instances.html#id-11510150__id-11568648
Question # 7 Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three ) A. Rewrite rules B. Behavior aggregate classifiers C. Traffic shapers D. Fixed classifiers E. Multifield Classifiers
Click for Answer
B. Behavior aggregate classifiers D. Fixed classifiers E. Multifield Classifiers
Answer Description Explanation:
Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:
Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.
Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.
Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters. Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.
Question # 8 Which two statements about IS-IS are correct? (Choose two.) A. PSNPs are used to acknowledge a received LSP. B. CSNPs are used to acknowledge a received LSP. C. CSNPs are used to request a missing LSP. D. PSNPs are used to request a missing LSP.
Click for Answer
A. PSNPs are used to acknowledge a received LSP. D. PSNPs are used to request a missing LSP.
Answer Description Explanation:
Intermediate System to Intermediate System (IS-IS) is a link-state routing protocol used to move information efficiently within a computer network. It uses a series of Protocol Data Units (PDUs) to manage the network's topology and ensure consistency across all routers in the network. Specifically, Link State PDUs (LSPs), Complete Sequence Number PDUs (CSNPs), and Partial Sequence Number PDUs (PSNPs) play crucial roles in this process.
1. PSNPs (Partial Sequence Number PDUs): Acknowledge a received LSP : PSNPs are used to acknowledge the receipt of LSPs. When a router receives an LSP, it sends a PSNP back to the sender to confirm that the LSP has been received.Request a missing LSP : PSNPs are also used to request missing LSPs. If a router identifies a missing LSP based on sequence numbers, it can send a PSNP to request the specific LSP from its neighbors.
2. CSNPs (Complete Sequence Number PDUs): Summarize LSPs : CSNPs are used to summarize all the LSPs known to a router. They are typically sent at regular intervals to provide a complete list of LSPs in a database. They are not used to acknowledge or request specific LSPs but provide an overview of all LSPs for database synchronization.
Based on this understanding, let's evaluate the statements:A. PSNPs are used to acknowledge a received LSP. Correct. PSNPs serve the purpose of acknowledging LSPs received from other routers.B. CSNPs are used to acknowledge a received LSP. Incorrect. CSNPs are not used for acknowledging LSPs; they are used to provide a summary of all LSPs.C. CSNPs are used to request a missing LSP. Incorrect. CSNPs are not used to request missing LSPs; this is the role of PSNPs.D. PSNPs are used to request a missing LSP. Correct. PSNPs are used to request specific missing LSPs when a router detects that it is missing information.Conclusion:
The correct statements about IS-IS are:A. PSNPs are used to acknowledge a received LSP. D. PSNPs are used to request a missing LSP. References: Juniper Networks Documentation on IS-IS: [IS-IS Overview](https://www.juniper.net/documentation/en_US/junos/topics/concept/is-is-routing-overview.html) RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments: [RFC 1195](https://tools.ietf.org/html/rfc1195) which details the operation and use of IS-IS, including the roles of PSNPs and CSNPs.
Up-to-Date
We always provide up-to-date JN0-664 exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our Service Provider Professional (JNCIP-SP) practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the JN0-664 exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download JNCIP-SP Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling JN0-664 practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied Juniper customer in this time. Our customers are our asset and precious to us more than their money.
JN0-664 Dumps
We have recently updated Juniper JN0-664 dumps study guide. You can use our JNCIP-SP braindumps and pass your exam in just 24 hours. Our Service Provider Professional (JNCIP-SP) real exam contains latest questions. We are providing Juniper JN0-664 dumps with updates for 3 months. You can purchase in advance and start studying. Whenever Juniper update Service Provider Professional (JNCIP-SP) exam, we also update our file with new questions. Passin1day is here to provide real JN0-664 exam questions to people who find it difficult to pass exam
JNCIP-SP can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with JN0-664 dumps. Juniper Certifications demonstrate your competence and make your discerning employers recognize that Service Provider Professional (JNCIP-SP) certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive Juniper exam dumps will enable you to pass your certification JNCIP-SP exam in just a single try. Passin1day is offering JN0-664 braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download JNCIP-SP dumps and access them at any device after purchase. Online Service Provider Professional (JNCIP-SP) practice tests are planned and designed to prepare you completely for the real Juniper exam condition. Free JN0-664 dumps demos can be available on customer’s demand to check before placing an order.
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my Juniper exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your JN0-664 exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your Service Provider Professional (JNCIP-SP) braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.