Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-650 Exam Dumps - Enterprise Routing and Switching - Professional (JNCIP-ENT)

Searching for workable clues to ace the Juniper JN0-650 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s JN0-650 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Which two EVPN types advertise an ESI without advertising a MAC address? (Choose two.)

A.

Type1

B.

Type 2

C.

Type 3

D.

Type 4

Full Access
Question # 10

Exhibit.

Referring to the exhibit, what is required for the BGP peering to establish?

A.

Configure neighbor 172.16.1.1 multipath under the ext-peers hierarchy.

B.

Configure neighbor 10.10.20. l multihop under the ext-peers hierarchy

C.

Configure neighbor lo.io.io.i multihop under the ext-peers hierarchy

D.

Configure neighbor 172.16.1.1 multihop under the ext-peers hierarchy

Full Access
Question # 11

You are configuring CoS throughout your enterprise network using DSCP. You have configured MF classification on your edge devices and are using BA classifiers throughout the core You are using the EZQoS template provided on your EX Series switches that are acting as your edge devices. You have loaded the configuration group and applied it to the appropriate interfaces. Classification and scheduling are working properly on your edge devices; however, traffic is not being classified correctly when it reaches your core devices

In this scenario, which statement is correct about solving this problem?

A.

You should configure and apply a policer to the edge devices' egress interfaces toward the core.

B.

You must configure the core devices using the EZQoS template as well

C.

You should configure and apply rewrite rules on the edge devices' egress interfaces toward the core

D.

You must configure the edge devices to use BA classifiers instead of MF classifiers

Full Access
Question # 12

You want to implement a system in your network to simplify VLAN management that can also dynamically create and prune VLANs. How would you accomplish this task?

A.

Enable GVRP on access interfaces.

B.

Enable MVRP and GVRP on all interfaces.

C.

Enable MVRP on trunk interfaces.

D.

Enable MVRP on access interfaces.

Full Access
Question # 13

An incorrectly configured routing policy at your service provider led to several hundred thousand routes being placed in your edge router's routing table In this scenario, how would you limit the number of prefixes received on a BGP peer session?

A.

Enable the damping BGP parameter in the edge router configuration

B.

Enable the prefix-limit BGP parameter in the edge router configuration.

C.

Enable the graceful-restart BGP parameter in the edge router configuration.

D.

Enable the advertise-inactive BGP parameter in the edge router configuration.

Full Access
Question # 14

Exhibit.

Referring to the exhibit, which statement is correct?

A.

The device with the highest IP address is elected as the DR.

B.

The OSPF state will be stuck in the Exstart state

C.

The OSPF state will be stuck in the 2Nay state

D.

The device with the lowest IP address is elected as the DR.

Full Access
Question # 15

Your existing enterprise network uses OSPFv3 on Juniper devices. You need to extend the networking into a new building, and it needs to be in its own OSPF area. Your team is debating about making the area a stub

Which two statements are correct in this scenario? (Choose two.)

A.

Stub areas can have an ASBR

B.

Stub areas can also be not-so-stubby areas.

C.

Stub areas do not support virtual links.

D.

Stub areas can be converted into totally stubby areas.

Full Access
Question # 16

Which two statements correctly describe how EX Series switches use captive portal for Layer 2 authentication? (Choose two.)

A.

The captive portal is the default Layer 2 authentication method that is applied before other methods such as 802 1X or MAC RADIUS.

B.

The captive portal authentication allowlist works for devices that do not have HTTP capabilities.

C.

The captive portal is configured on Layer 3 interfaces and does not participate in Layer 2 authentication on EX Series switches.

D.

The captive portal is used as a fallback mechanism for clients that fail 802.1X or MAC RADIUS authentication.

Full Access
Go to page: