Question # 1
In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received?
|
A. LSA flooding guarantees that all routers will receive them successfully.
| B. LSAs are sent over a TCP connection.
| C. LSAs are acknowledged by the neighboring router.
| D. LSAs are advertised with an acknowledgement bit.
|
C. LSAs are acknowledged by the neighboring router.
Explanation:
OSPF Protocol Basics:
OSPF (Open Shortest Path First) is a link-state routing protocol.
Routers exchange LSAs (Link-State Advertisements) to share topology information.
LSA Acknowledgment Mechanism:
OSPF uses a reliable mechanism to ensure LSAs are received.
When a router sends an LSA to a neighbor, it expects an acknowledgment (ACK).
If an ACK is not received within a certain period, the router will retransmit the LSA.
Acknowledgment Process:
LSAs are sent over OSPF's reliable transport, which ensures delivery through acknowledgments.
This mechanism helps to maintain consistent and up-to-date topology databases across routers.
References:
OSPF RFC 2328
Understanding OSPF Operations
Question # 2
You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task?
|
A. Configure the ignore-attached-bit parameter on all L2 routers.
| B. Configure all routers to allow wide metrics.
| C. Configure all routers to be L1.
| D. Configure the ignore-attached-bit parameter on all L1 routers
|
D. Configure the ignore-attached-bit parameter on all L1 routers
Explanation:
The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1 routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their routing tables.
Question # 3
Which two statements are correct about the customer interface in an LDP-signaled pseudowire? (Choose two)
|
A. When the encapsulation is vlan-ccc or extended-vlan-ccc, the configured VLAN tag is not included in the control plane LDP advertisement
| B. When the encapsulation is ethernet-ccc, only frames without a VLAN tag are accepted in the data plane
| C. When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement
| D. When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.
|
C. When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement
D. When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.
Explanation:
The customer interface in an LDP-signaled pseudowire is the interface on the PE router that connects to the CE device. An LDP-signaled pseudowire is a type of Layer 2 circuit that uses LDP to establish a point-to-point connection between two PE routers over an MPLS network. The customer interface can have different encapsulation types depending on the type of traffic that is carried over the pseudowire. The encapsulation types are ethernet-ccc, vlan-ccc, extended-vlan-ccc, atm-ccc, frame-relay-ccc, ppp-ccc, cisco-hdlc-ccc, and tcc-ccc. Depending on the encapsulation type, the customer interface can accept or reject tagged or untagged frames in the data plane, and include or exclude VLAN tags in the control plane LDP advertisement. The following table summarizes the behavior of different encapsulation types:
Question # 4
Which two statements are correct regarding bootstrap messages that are forwarded within a PIM sparse mode domain? (Choose two.)
|
A. Bootstrap messages are forwarded only to routers that explicitly requested the messages within the PIM sparse-mode domain
| B. Bootstrap messages distribute RP information dynamically during an RP election.
| C. Bootstrap messages are used to notify which router is the PIM RP
| D. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.
|
B. Bootstrap messages distribute RP information dynamically during an RP election.
D. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.
Explanation:
Bootstrap messages are PIM messages that are used to distribute rendezvous point (RP) information dynamically during an RP election. Bootstrap messages are sent by bootstrap routers (BSRs), which are routers that are elected to perform the RP discovery function for a PIM sparse-mode domain. Bootstrap messages contain information about candidate RPs and their multicast groups, as well as BSR priority and hash mask length. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain using hop-by-hop flooding.
Question # 5
Which two statements describe PIM-SM? (Choose two)
|
A. Routers with receivers send join messages to their upstream neighbors.
| B. Routers without receivers must periodically prune themselves from the SPT.
| C. Traffic is initially flooded to all routers and an S,G is maintained for each group | D. Traffic is only forwarded to routers that request to join the distribution tree.
|
A. Routers with receivers send join messages to their upstream neighbors.
D. Traffic is only forwarded to routers that request to join the distribution tree.
Explanation:
PIM sparse mode (PIM-SM) is a multicast routing protocol that uses a pull model to deliver multicast traffic. In PIM-SM, routers with receivers send join messages to their upstream neighbors toward a rendezvous point (RP) or a source-specific tree (SPT). The RP or SPT acts as the root of a shared distribution tree for a multicast group. Traffic is only forwarded to routers that request to join the distribution tree by sending join messages. PIM-SM does not flood traffic to all routers or prune routers without receivers, as PIM dense mode does.
Question # 6
Which two statements about IS-IS are correct? (Choose two.)
|
A. PSNPs are used to acknowledge a received LSP.
| B. CSNPs are used to acknowledge a received LSP.
| C. CSNPs are used to request a missing LSP.
| D. PSNPs are used to request a missing LSP.
|
A. PSNPs are used to acknowledge a received LSP.
D. PSNPs are used to request a missing LSP.
Explanation:
Intermediate System to Intermediate System (IS-IS) is a link-state routing protocol used to move information efficiently within a computer network. It uses a series of Protocol Data Units (PDUs) to manage the network's topology and ensure consistency across all routers in the network. Specifically, Link State PDUs (LSPs), Complete Sequence Number PDUs (CSNPs), and Partial Sequence Number PDUs (PSNPs) play crucial roles in this process.
1. PSNPs (Partial Sequence Number PDUs):
Acknowledge a received LSP: PSNPs are used to acknowledge the receipt of LSPs. When a router receives an LSP, it sends a PSNP back to the sender to confirm that the LSP has been received.
Request a missing LSP: PSNPs are also used to request missing LSPs. If a router identifies a missing LSP based on sequence numbers, it can send a PSNP to request the specific LSP from its neighbors.
2. CSNPs (Complete Sequence Number PDUs):
Summarize LSPs: CSNPs are used to summarize all the LSPs known to a router. They are typically sent at regular intervals to provide a complete list of LSPs in a database. They are not used to acknowledge or request specific LSPs but provide an overview of all LSPs for database synchronization.
Based on this understanding, let's evaluate the statements:
A. PSNPs are used to acknowledge a received LSP.
Correct. PSNPs serve the purpose of acknowledging LSPs received from other routers.
B. CSNPs are used to acknowledge a received LSP.
Incorrect. CSNPs are not used for acknowledging LSPs; they are used to provide a summary of all LSPs.
C. CSNPs are used to request a missing LSP.
Incorrect. CSNPs are not used to request missing LSPs; this is the role of PSNPs.
D. PSNPs are used to request a missing LSP.
Correct. PSNPs are used to request specific missing LSPs when a router detects that it is missing information.
Conclusion:
The correct statements about IS-IS are:
A. PSNPs are used to acknowledge a received LSP.
D. PSNPs are used to request a missing LSP.
References:
Juniper Networks Documentation on IS-IS: [IS-IS Overview](https://www.juniper.net/documentation/en_US/junos/topics/concept/is-is-routing-overview.html)
RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments: [RFC 1195](https://tools.ietf.org/html/rfc1195) which details the operation and use of IS-IS, including the roles of PSNPs and CSNPs.
Question # 7
When using OSPFv3 for an IPv4 environment, which statement is correct?
|
A. OSPFv3 only supports IPv4.
| B. OSPFv3 supports both IPv6 and IPv4, but not in the same routing instance.
| C. OSPFv3 is not backward compatible with IPv4
| D. OSPFv3 supports IPv4 only on interfaces with family inet6 defined
|
D. OSPFv3 supports IPv4 only on interfaces with family inet6 defined
Question # 8
Which two statements are correct about VPLS tunnels? (Choose two.)
|
A. LDP-signaled VPLS tunnels only support control bit 0.
| B. LDP-signaled VPLS tunnels use auto-discovery to provision sites
| C. BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.
| D. BGP-signaled VPLS tunnels require manual provisioning of sites.
|
A. LDP-signaled VPLS tunnels only support control bit 0.
C. BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.
Explanation:
https://www.juniper.net/documentation/us/en/software/nce/feature-guide-virtual-private-lan-service/topics/task/vpls-ldp-signaling-solutions.html
https://www.juniper.net/documentation/us/en/software/junos/vpn-l2/topics/concept/vpns-configuring-vpls-routing-instances.html#id-11510150__id-11568648
Question # 9
Which two statements are correct about a sham link? (Choose two.)
|
A. It creates an OSPF multihop neighborship between two PE routers.
| B. It creates a BGP multihop neighborship between two PE routers.
| C. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes
| D. The PEs exchange Type 3 OSPF LSAs instead of Type 1 OSPF LSAs for the L3VPN routes.
|
A. It creates an OSPF multihop neighborship between two PE routers.
C. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes
Explanation:
A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring an intra-area back door link over the VPN backbone. A sham link creates an OSPF multihop neighborship between the PE routers using TCP port 646. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes, which allows OSPF to use the correct metric for route selection1.
Question # 10
Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )
|
A. Rewrite rules
| B. Behavior aggregate classifiers
| C. Traffic shapers
| D. Fixed classifiers
| E. Multifield Classifiers
|
B. Behavior aggregate classifiers
D. Fixed classifiers
E. Multifield Classifiers
Explanation:
Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:
Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.
Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.
Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters. Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.
Get 93 Service Provider Professional (JNCIP-SP) questions Access in less then $0.12 per day.
Juniper Bundle 1: 1 Month PDF Access For All Juniper Exams with Updates $100
$400
Buy Bundle 1
Juniper Bundle 2: 3 Months PDF Access For All Juniper Exams with Updates $200
$800
Buy Bundle 2
Juniper Bundle 3: 6 Months PDF Access For All Juniper Exams with Updates $300
$1200
Buy Bundle 3
Juniper Bundle 4: 12 Months PDF Access For All Juniper Exams with Updates $400
$1600
Buy Bundle 4
Disclaimer: Fair Usage Policy - Daily 5 Downloads
Service Provider Professional (JNCIP-SP) Exam Dumps
Exam Code: JN0-664
Exam Name: Service Provider Professional (JNCIP-SP)
- 90 Days Free Updates
- Juniper Experts Verified Answers
- Printable PDF File Format
- JN0-664 Exam Passing Assurance
Get 100% Real JN0-664 Exam Dumps With Verified Answers As Seen in the Real Exam. Service Provider Professional (JNCIP-SP) Exam Questions are Updated Frequently and Reviewed by Industry TOP Experts for Passing JNCIP-SP Exam Quickly and Hassle Free.
Juniper JN0-664 Dumps
Struggling with Service Provider Professional (JNCIP-SP) preparation? Get the edge you need! Our carefully created JN0-664 dumps give you the confidence to pass the exam. We offer:
1. Up-to-date JNCIP-SP practice questions: Stay current with the latest exam content.
2. PDF and test engine formats: Choose the study tools that work best for you. 3. Realistic Juniper JN0-664 practice exam: Simulate the real exam experience and boost your readiness.
Pass your JNCIP-SP exam with ease. Try our study materials today!
Official Service Provider Professional JNCIP-SP exam info is available on Juniper website at https://www.juniper.net/gb/en/training/certification/tracks/service-provider-routing-switching/jncip-sp.html
Prepare your JNCIP-SP exam with confidence!We provide top-quality JN0-664 exam dumps materials that are:
1. Accurate and up-to-date: Reflect the latest Juniper exam changes and ensure you are studying the right content.
2. Comprehensive Cover all exam topics so you do not need to rely on multiple sources.
3. Convenient formats: Choose between PDF files and online Service Provider Professional (JNCIP-SP) practice test for easy studying on any device.
Do not waste time on unreliable JN0-664 practice test. Choose our proven JNCIP-SP study materials and pass with flying colors. Try Dumps4free Service Provider Professional (JNCIP-SP) 2024 material today!
-
Assurance
Service Provider Professional (JNCIP-SP) practice exam has been updated to reflect the most recent questions from the Juniper JN0-664 Exam.
-
Demo
Try before you buy! Get a free demo of our JNCIP-SP exam dumps and see the quality for yourself. Need help? Chat with our support team.
-
Validity
Our Juniper JN0-664 PDF contains expert-verified questions and answers, ensuring you're studying the most accurate and relevant material.
-
Success
Achieve JN0-664 success! Our Service Provider Professional (JNCIP-SP) exam questions give you the preparation edge.
If you have any question then contact our customer support at live chat or email us at support@dumps4free.com.
|