[Free] New Updated (October) Juniper TK0-201 Real Exam 291-300

Ensurepass

 

QUESTION 291

Router 2 is receiving a route to 10.0.0.0/8 from Router 4 and Router 5. What will Router 2 do with the routes shown in the exhibit?

 

clip_image001

 

A.

Router 2 will mark both routes active if the next hops are reachable.

B.

Router 2 will prefer the route received from Router 4 because of a lower origin code value.

C.

Router 2 will prefer the route that arrived first because neither route is necessarily preferable over the other.

D.

Router 2 will prefer the route received from Router 5 because it has a shorter AS path.

 

Correct Answer: D

 

 

 

 

 

QUESTION 292

Refer to the router configuration shown in the exhibit. To which IS-IS area does this router belong?

 

clip_image002

 

A.

Area 49

B.

Area 0100

C.

Area 49.2020

D.

Area 49.2020.0100.1001.0001

 

Correct Answer: C

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 293

In the exhibit, Router A and Router B have a VRRP relationship through Switch A. Router A is the VRRP master and Router B’s VRRP priority is set to the default. Based on the configuration for Router A shown in the exhibit, which two interfaces must go down for Router B to become the VRRP master? (Choose two.)

 

clip_image003

 

A.

ge-0/0/0

B.

ge-0/0/2

C.

ge-0/0/3

D.

ge-0/0/7

 

Correct Answer: AB

 

 

QUESTION 294

Why does a router create an ASBRSum (Type 4) LSA?

 

A.

An ABR creates an ASBRSum (Type 4
) LSA with the information contained in NSSA (Type 7) LSAs it receives from NSSAs.

B.

An ABR creates an ASBRSum (Type 4) LSA to describe the router ID of ASBRs located in other areas.

C.

An ASBR creates an ASBRSum (Type 4) LSA to describe its router ID so that routers in other areas can reach the external networks it advertises.

D.

An ABR creates an ASBRSum (Type 4) LSA to summarize routes received from other areas.

 

Correct Answer: B

QUESTION 295

A router is configured to use standard metrics. The router has a single link to a Level 2 IS- IS neighbor. What is the maximum metric for that link?

 

A.

63

B.

254

C.

1023

D.

65534

 

Correct Answer: A

 

 

QUESTION 296

You want traffic destined for the 66.142.1.0/24 network to traverse an IP-IP tunnel. You notice traffic being sent to any address in that subnet is not being received. Upon reviewing the output shown in the exhibit, what is the problem?

 

clip_image004

 

A.

The route is in the wrong routing table.

B.

The route is a static route; a dynamic routing protocol must be used.

C.

The route is not active in the inet.2 routing table.

D.

The route does not point to the IP-IP tunnel.

 

Correct Answer: D

 

 

QUESTION 297

In the exhibit, four routers (R1, R2, R3, and R4) are attached to a single Ethernet LAN and configured with addresses in the same subnet. All devices boot at the same time. Which router or routers will send a Network (Type 2) LSA for the network?

 

clip_image005

 

A.

R2

B.

R4

C.

R1 and R2

D.

R3 and R4

 

Correct Answer: B

 

 

QUESTION 298

Devices S1 and S2 have the interface configurations as shown in the exhibit. You attach ge-0/0/0 on S1 to ge-0/0/0 on S2. You attach ge-0/0/1 on S1 to ge-1/0/20 on S2. However, the ae0 interface remains down on both S1 and S2. What should you change to cause the ae0 interface to come up?

 

clip_image006

 

A.

You should use consecutive interfaces on S2.

B.

You should use interfaces on S2 that are on the same member of the Virtual Chassis.

C.

You should configure at least one switch to run LACP in active mode.

D.

You should make the list of VLANs on the ae0 interfaces on S1 and S2 match.

 

Correct Answer: C

 

QUESTION 299

What is the purpose of MAC limiting?

 

A.

MAC limiting limits the size of the CAM table and accelerates the aging of MAC addresses.

B.

MAC limiting sets a maximum rate on addresses learned over a period of time to minimize possible congestion caused by flooding.

C.

MAC limiting limits the number of source MAC addresses that may be learned on an interface and protects it from MAC spoofing.

D.

MAC limiting on a Layer 3 interface prevents a duplicate MAC address for a single IP address.

 

Correct Answer: C

 

 

QUESTION 300

You have enabled VRRP. You want to prevent preemptive behavior. Which two actions must you perform? (Choose two.)

 

A.

Use an IP address that is not assigned to a router interface.

B.

Use the IP address of one of the routers as the virtual address.

C.

Disable preemption with the no-preempt command.

D.

Set both routers to the same priority value.

 

Correct Answer: AC

Free VCE & PDF File for Juniper TK0-201 Real Exam

Instant Access to Free VCE Files: Juniper | Juniper | SAP …
Instant Access to Free PDF Files: Juniper | Juniper | SAP …

This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.