Download New Updated (July) Juniper JN0-360 Actual Test 61-70

Ensurepass

 

QUESTION 61

You want to verify the frequency and type of SPF calculations on your Junos device. Which command displays this information?

 

A.

show ospf database | match log

B.

show spf log

C.

show ospf log

D.

show ospf statistics

 

Correct Answer: C

 

 

QUESTION 62

What are two functions of an OSPF BDR? (Choose two.)

 

A.

The BDR advertises link-state information with all other OSPF routers on the segment.

B.

The BDR forms an adjacency with all other OSPF routers on the segment.

C.

The BDR is ready to assume the role of the DR device if it fails.

D.

The BDR functions can be distributed to the DR device on the segment.

 

Correct Answer: BC

 

 

 

QUESTION 63

Click the Exhibit button. Based on the exhibit, which configuration will permit end-to-end routing through the GRE tunnel for R1?

 

clip_image002

 

A.

[edit]

user@R1# show routing-options static

route 192.168.2.1/32 next-hop gr-0/0/0.0;

route 172.20.111.0/24 next-hop 192.168.1.1;

B.

[edit]

user@R1# show routing-options static

route 192.168.2.1/32 next-hop gr-0/0/0.0;

route 172.20.111.0/24 next-hop 172.18.1.1;

C.

[edit]

user@R1# show routing-options static

route 192.168.2.1/32 next-hop 172.18.1.1;

route 172.20.
111.0/24 next-hop gr-0/0/0.0;

D.

[edit]

user@R1# show routing-options static

route 192.168.2.1/32 next-hop 172.18.2.2;

route 172.20.111.0/24 next-hop 172.18.1.1;

 

Correct Answer: C

 

 

QUESTION 64

What are two ways that nonstop routing works? (Choose two.)

 

A.

by enabling redundant REs to switch from primary RE to backup RE

B.

by alerting peer nodes of any routing table changes

C.

by enabling redundant REs to run a different version of the Junos OS

D.

by replicating routing protocol information

 

Correct Answer: AD

 

 

QUESTION 65

A route to the same destination is received from two different BGP sources. Which criterion is considered first to determine the active BGP route?

 

A.

cluster length

B.

AS-path length

C.

lowest RID

D.

local preference

 

Correct Answer: D

 

 

QUESTION 66

Click the Exhibit button. Referring to the exhibit, R1 and R2 are directly connected using interface ge-1/1/0. What happens as a result of the configurations?

 

— Exhibit —

 

user@R1> show

 

interfaces {

 

ge-1/1/0 {

 

unit 0 {

 

family inet {

 

address 10.100.1.1/30;

 

}

 

family iso;

 

}

 

}

 

lo0 {

 

unit 0 {

 

family inet {

 

address 10.100.10.1/32;

 

}

 

family iso {

 

 

address 49.1001.0010.0100.00;

 

}

 

}

 

}

 

}

protocols {

 

isis {

 

interface ge-1/1/0.0 {

 

level 2 disable;

 

}

 

interface lo0.0;

 

}

 

}

 

user@R2> show

 

interfaces {

 

ge-1/1/0 {

 

unit 0 {

 

family inet {

 

address 10.100.1.2/30;

 

}

 

}

 

}

 

lo0 {

 

unit 0 {

 

family inet {

 

address 10.100.10.2/32;

 

}

 

family iso {

 

address 49.1001.0010.0200.00;

 

}

 

}

 

}

 

}

 

protocols {

 

isis {

 

interface ge-1/1/0.0;

 

interface lo0.0;

 

}

 

}

 

— Exhibit —

 

A.

No adjacency forms

B.

Level 2 adjacency forms

C.

Level 1 adjacency forms

D.

Level 1 and Level 2 adjacencies form

 

Correct Answer: C

 

 

QUESTION 67

Which three BGP attributes are used for loop prevention? (Choose three.)

 

A.

AS path

B.

originator ID

C.

next hop

D.

cluster list

E.

origin

 

Correct Answer: ABD

 

 

QUESTION 68

Click the Exhibit button. R1 and R2 have a Level 1 IS-IS adjacency. R2 participates in both Level 1 and Level 2, and is receiving routes from a Level 2 neighbor. A policy on R2 has been created to leak routes to Level 1, but R1 is not receiving the routes. Referring to the exhibit, what is the solution on R2?

 

— Exhibit —

 

user@R2> show

 

protocols {

 

isis {

 

export leak;

 

interface ge-1/1/0.0;

 

interface ge-1/1/1.0 {

 

level 1 disable;

 

}

 

interface lo0.0;

 

}

 

}

 

policy-options {

 

policy-statement leak {

 

term 1 {

 

from level 1;

 

to level 2;

 

then accept;

 

}

 

}

 

}

 

— Exhibit —

 

A.

The policy must be applied as an export policy at the interface level.

B.

Th
e policy must be changed to include from protocol isis.

C.

The policy must be changed to specify from level 2 and to level 1.

D.

The policy must be applied as an import policy.

 

Correct Answer: C

 

 

QUESTION 69

In Q-in-Q tunneling, what is the purpose of the pop-swap operation?

 

A.

pop the outer tag and swap the inner tag

B.

pop and swap the inner tag

C.

pop and swap both outer and inner tags

D.

pop the inner tag and swap the outer tag

 

Correct Answer: A

 

 

QUESTION 70

Which three are valid IPv6 extension headers? (Choose three.)

 

A.

multicast header

B.

authentication header

C.

autoconfiguration options

D.

fragment

E.

hop-by-hop options

 

Correct Answer: BDE

 

Free VCE & PDF File for Juniper JN0-360 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-360 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.