JN0-664 Juniper JNCIP-SP Exam Practice Questions
JN0-664 Juniper JNCIP-SP Exam Practice Questions
What's Inside:
Important Note:
For full access to the complete question bank and topic-wise explanations, visit:
CertQuestionsBank.com
FB page: https://www.facebook.com/certquestionsbank
Share some JN0-664 exam online questions below.
1.Exhibit
Which two statements are true about the OSPF adjacency displayed in the exhibit? (Choose two.)
A. There is a mismatch in the hello interval parameter between routers R1 and R2
B. There is a mismatch in the dead interval parameter between routers R1 and R2.
C. There is a mismatch in the OSPF hold timer parameter between routers R1 and R2.
D. There is a mismatch in the poll interval parameter between routers R1 and R2.
Answer: A,B
Explanation:
The hello interval is the time interval between two consecutive hello packets sent by an OSPF router
on an interface. The dead interval is the time interval after which a neighbor is declared down if no
hello packets are received from it. These parameters must match between two OSPF routers for them
to form an adjacency. In the exhibit, router R1 has a hello interval of 10 seconds and a dead interval
of 40 seconds, while router R2 has a hello interval of 30 seconds and a dead interval of 120 seconds.
This causes a mismatch and prevents them from becoming neighbors23.
2.Exhibit
Referring to the exhibit, a working L3VPN exists that connects VPN-A sites CoS is configured
correctly to match on the MPLS EXP bits of the LSP, but when traffic is sent from Site-1 to Site-2,
PE-2 is not classifying the traffic correctly
What should you do to solve the problem?
A. Configure the explicit-null statement on PE-1.
B. Configure the explicit-null statement on PE-2
C. Configure VPN prefix mapping for the PE-1_to_PE-2 LSP
D. Set a static CoS value for the PE-1_to_PE-2 LSP
Answer: A
Explanation:
The explicit-null statement enables the PE router to send an MPLS label with a value of 0 (explicit
null) instead of an IP header for packets destined to the VPN customer sites. This allows the
penultimate hop router (the router before the egress PE router) to preserve the EXP bits of the MPLS
label and pass them to the egress PE router. The egress PE router can then use these EXP bits to
classify the traffic according to the CoS policy2. In this example, PE-1 should configure the explicit-
null statement under [edit protocols mpls label-switched-path PE-1_to_PE-2] hierarchy level.
3.You are configuring a BGP signaled Layer 2 VPN across your MPLS enabled core network. Your
PE-2 device connects to two sites within the s VPN
In this scenario, which statement is correct?
A. By default on PE-2, the site's local ID is automatically assigned a value of 0 and must be
configured to match the total number of attached sites.
B. You must create a unique Layer 2 VPN routing instance for each site on the PE-2 device.
C. You must use separate physical interfaces to connect PE-2 to each site.
D. By default on PE-2, the remote site IDs are automatically assigned based on the order that you
add the interfaces to the site configuration.
Answer: D
Explanation:
BGP Layer 2 VPNs use BGP to distribute endpoint provisioning information and set up pseudowires
between PE devices. BGP uses the Layer 2 VPN (L2VPN) Routing Information Base (RIB) to store
endpoint provisioning information, which is updated each time any Layer 2 virtual forwarding instance
(VFI) is configured. The prefix and path information is stored in the L2VPN database, which allows
BGP to make decisions about the best path.
In BGP Layer 2 VPNs, each site has a unique site ID that identifies it within a VFI. The site ID can be
manually configured or automatically assigned by the PE device. By default, the site ID is
automatically assigned based on the order that you add the interfaces to the site configuration. The
first interface added to a site configuration has a site ID of 1, the second interface added has a site ID
of 2, and so on.
Option D is correct because by default on PE-2, the remote site IDs are automatically assigned based
on the order that you add the interfaces to the site configuration. Option A is not correct because by
default on PE-2, the site’s local ID is automatically assigned a value of 0 and does not need to be
configured to match the total number of attached sites. Option B is not correct because you do not
need to create a unique Layer 2 VPN routing instance for each site on the PE-2 device. You can
create one routing instance for all sites within a VFI. Option C is not correct because you do not need
to use separate physical
interfaces to connect PE-2 to each site. You can use subinterfaces or service instances on a single
physical interface.
5.Exhibit
The environment is using BGP All devices are in the same AS with reachability redundancy Referring
to the exhibit, which statement is correct?
A. RR1 is peered to Client2 and RR2
B. RR2 is in an OpenConfirm State until RR1 becomes unreachable.
C. Client1 is peered to Client2 and Client3.
D. Peering is dynamically discovered between all devices.
Answer: A
Explanation:
BGP route reflectors are BGP routers that are allowed to ignore the IBGP loop avoidance rule and
advertise IBGP learned routes to other IBGP peers under specific conditions. BGP route reflectors
can reduce the number of IBGP sessions and updates in a network by eliminating the need for a full
mesh of IBGP peers.
BGP route reflectors can have three types of peerings:
? EBGP neighbor: A BGP router that belongs to a different autonomous system (AS) than the route
reflector.
? IBGP client neighbor: An IBGP router that receives reflected routes from the route reflector. A client
does not need to peer with other clients or non-clients.
? IBGP non-client neighbor: An IBGP router that does not receive reflected routes from the route
reflector. A non-client needs to peer with other non-clients and the route reflector.
In the exhibit, we can see that RR1 and RR2 are route reflectors in the same AS with reachability
redundancy. They have two types of peerings: EBGP neighbors (R1 and R4) and IBGP client
neighbors (Client1, Client2, and Client3). RR1 and RR2 are also peered with each other as IBGP non-
client neighbors.
6.Exhibit
7.Which statement is correct about IS-IS when it performs the Dijkstra algorithm?
A. The local router moves its own local tuples into the candidate database
B. When a new neighbor ID in the tree database matches a router ID in the LSDB, the neighbor ID is
moved to the candidate database
C. Tuples with the lowest cost are moved from the tree database to the LSDB.
D. The algorithm will stop processing once the tree database is empty.
Answer: A
Explanation:
IS-IS is a link-state routing protocol that uses the Dijkstra algorithm to compute the shortest paths
between nodes in a network. The Dijkstra algorithm maintains three data structures: a tree database,
a candidate database, and a link-state database (LSDB). The tree database contains the nodes that
have been visited and their shortest distances from the source node. The candidate database
contains the nodes that have not been visited yet and their tentative distances from the source node.
The LSDB contains the topology information of the network, such as the links and their costs.
The Dijkstra algorithm works as follows:
? The local router moves its own local tuples into the tree database. A tuple consists of a node ID, a
distance, and a parent node ID. The local router’s tuple has a distance of zero and no parent node.
? The local router moves its neighbors’ tuples into the candidate database. The neighbors’ tuples
have distances equal to the costs of the links to them and parent node IDs equal to the local router’s
node ID.
? The local router selects the tuple with the lowest distance from the candidate database and moves it
to the tree database. This tuple becomes the current node.
? The local router updates the distances of the current node’s neighbors in the candidate database
by adding the current node’s distance to the link costs. If a shorter distance is found, the parent node
ID is also updated.
? The algorithm repeats steps 3 and 4 until either the destination node is reached or the candidate
database is empty.
8.Exhibit
You are attempting to summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500. You
implement the export policy shown in the exhibit and all routes from the routing table stop being
advertised.
In this scenario, which two steps would you take to summarize the route in BGP? (Choose two.)
A. Remove the from protocol bgp command from the export policy.
B. Add the set protocols bgp family inet unicast add-path command to allow additional routes to the
RIB tables.
C. Add the set routing-options static route 203.0.113.123/25 discard command.
D. Replace exact in the export policy with orlonger.
Answer: C,D
Explanation:
To summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500, you need to do the
following:
? Add the set routing-options static route 203.0.113.128/25 discard command. This creates a static
route for the summary prefix and discards any traffic destined to it. This is necessary because BGP
can only advertise routes that are present in the routing table.
? Replace exact in the export policy with orlonger. This allows R8 to match and advertise any route
that is equal or more specific than the summary prefix. The exact term only matches routes that are
exactly equal to the summary prefix, which is not present in the routing table.
9.Exhibit
Which two statements about the configuration shown in the exhibit are correct? (Choose two.)
A. This VPN connects customer sites that use different AS numbers.
B. This VPN connects customer sites that use the same AS number
C. A Layer 2 VPN is configured.
D. A Layer 3 VPN is configured.
Answer: A,D
Explanation:
The configuration shown in the exhibit is for a Layer 3 VPN that connects customer sites that use
different AS numbers. A Layer 3 VPN is a type of VPN that uses MPLS labels to forward packets
across a provider network and BGP to exchange routing information between PE routers and CE
routers. A Layer 3 VPN allows customers to use different routing protocols and AS numbers at their
sites, as long as they can peer with BGP at the PE-CE interface. In this example, CE-1 is using AS
65530 and CE-2 is using AS 65531, but they can still communicate through the VPN because they
have BGP sessions with PE-1 and PE-2, respectively.
10.1.Which two statements are correct about reflecting inet-vpn unicast prefixes in BGP route
reflection? (Choose two.)
A. Route reflectors do not change any existing BGP attributes by default when advertising routes.
B. A BGP peer does not require any configuration changes to become a route reflector client.
C. Clients add their originator ID when advertising routes to their route reflector
D. Route reflectors add their cluster ID to the AS path when readvertising client routes.
Answer: A,B
Explanation:
Route reflection is a BGP feature that allows a router to reflect routes learned from one IBGP peer to
another IBGP peer, without requiring a full-mesh IBGP topology. Route reflectors do not change any
existing BGP attributes by default when advertising routes, unless explicitly configured to do so. A
BGP peer does not require any configuration changes to become a route reflector client, only the
route reflector needs to be configured with the client parameter under [edit protocols bgp group group-
name neighbor neighbor-address] hierarchy level.
11.Exhibit
You want to implement the BGP Generalized TTL Security Mechanism (GTSM) on the network
Which three statements are correct in this scenario? (Choose three)
A. You can implement BGP GTSM between R2, R3, and R4
B. BGP GTSM requires a firewall filter to discard packets with incorrect TTL.
C. You can implement BGP GTSM between R2 and R1.
D. BGP GTSM requires a TTL of 1 to be configured between neighbors.
E. BGP GTSM requires a TTL of 255 to be configured between neighbors.
Answer: A,D,E
Explanation:
BGP GTSM is a technique that protects a BGP session by comparing the TTL value in the IP header
of incoming BGP packets against a valid TTL range. If the TTL value is within the valid TTL range, the
packet is accepted. If not, the packet is discarded. The valid TTL range is from 255 C the configured
hop count + 1 to 255. When GTSM is configured, the BGP packets sent by the device have a TTL of
255. GTSM provides best protection for directly connected EBGP sessions, but not for multihop
EBGP or IBGP sessions because the TTL of packets might be modified by intermediate devices.
In the exhibit, we can see that R2, R3, and R4 are in the same AS (AS 20) and R1 is in a different AS
(AS 10).
Based on this information, we can infer the following statements:
? You can implement BGP GTSM between R2, R3, and R4. This is not correct because R2, R3, and
R4 are IBGP peers and GTSM does not provide effective protection for IBGP sessions. The TTL of
packets between IBGP peers might be changed by intermediate devices or routing protocols.
? BGP GTSM requires a firewall filter to discard packets with incorrect TTL. This is not correct
because BGP GTSM does not require a firewall filter to discard packets with incorrect TTL. BGP
GTSM uses TCP option 19 to negotiate GTSM capability between peers and uses TCP option 20 to
carry the expected TTL value in each packet. The receiver checks the expected TTL value against
the actual TTL value and discards packets with incorrect TTL values.
? You can implement BGP GTSM between R2 and R1. This is correct because R2 and R1 are EBGP
peers and GTSM provides effective protection for directly connected EBGP sessions. The TTL of
packets between directly connected EBGP peers is not changed by intermediate devices or routing
protocols.
? BGP GTSM requires a TTL of 1 to be configured between neighbors. This is not correct because
BGP GTSM requires a TTL of 255 to be configured between neighbors. The sender sets the TTL of
packets to 255 and the receiver expects the TTL of packets to be 255 minus the configured hop
count.
? BGP GTSM requires a TTL of 255 to be configured between neighbors. This is correct because
BGP GTSM requires a TTL of 255 to be configured between neighbors. The sender sets the TTL of
packets to 255 and the receiver expects the TTL of packets to be 255 minus the configured hop
count.