JN0-661 Exam Dumps


Interested in starting a career with Juniper Technologies Certification? You made an absolutely right decision. With Juniper dumps, you will be able to get this certification in a stress-free manner and master the skills to use Juniper technologies and products.

JN0-661 Dumps

juniperexams.com is one of the top certification providers offering a prospering career to the IT professionals. Get the most updated real JN0-661 dumps exam questions with the correct answers here! We are sure about that you will not find JN0-661 dumps of such quality anywhere in the market. Save extra money by getting 90-days of free updates after purchasing the Juniper JN0-661 PDF. You can find these useful dumps by using some keywords, like JN0-661 Braindumps, Free JN0-661 Questions Answers, Free Juniper JN0-661 Study Material, and so on…Guaranteed pass with secure purchase and 24/7 Online Customers service.

JN0-661 Exam Dumps

JN0-661 Braindumps | Which two statements are true…

Questions: 21

Which two statements are true regarding the CSPF algorithm? (Choose two.)

A. The selected path for a given LSP is passed to the TED in the form of an ERO.
B. LSPs with lower numerical setup priorities are computed before LSPs with higher setup priority values.
C. The selected path for a given LSP is passed to RSVP in the form of an ERO.
D. LSPs with higher numerical setup priorities are computed before LSPs with lower setup priority values.

Answer: BC

JN0-661 | You need to ensure that your high-priority…

Question: 20

You need to ensure that your high-priority traffic uses the best-possible route while your best-effort traffic uses a lower preference route. You want to use CoS-based forwarding to use the DSCP values of the different types of traffic to assign the LSP that should be used for the next hop. Which three additions must be made to the configuration to satisfy the requirement? (Choose three.)

A. a class-of-service forwarding policy
B. a policy statement for LSP next-hop selection
C. an important policy applied to the forwarding table
D. an export policy applied to the forwarding table
E. a multifield firewall filter for LSP next-hop selection

Answer: A, D, E

JN0-661 | Your company has multiple upstream BGP…

Question: 19

Your company has multiple upstream BGP connections to the Internet ISP-A, ISP-B, and ISP-C. You want to ensure that all traffic coming into your network uses
ISP-A.
How would you accomplish this task?

A. Change the route preference to be higher on routes being advertised to ISP-B and ISP-C.
B. Prepend your AS number on routes being advertised to ISP-B and ISP-C.
C. Change the local preference to be higher on routes being advertised to ISP-A.
D. Prepend your AS number on routes being advertised to ISP-A.

Answer: A

Explanation:

Understanding BGP Path Selection
For each prefix in the routing table, the routing protocol process selects a single best path. After the best path is selected, the route is installed in the routing table.
The best path becomes the active route if the same prefix is not learned by a protocol with a lower (more preferred) global preference value, also known as the
administrative distance. The algorithm for determining the active route is as follows:
1. Verify that the next hop can be resolved.
2. Choose the path with the lowest preference value (routing protocol process preference).
Routes that are not eligible to be used for forwarding (for example, because they were rejected by routing policy or because a next hop is inaccessible) have a preference of –1 and are never chosen.
Etc.

JN0-661 | An L2VPN (draft-kompella-mpls-l2vpn) is…

Question: 18

An L2VPN (draft-kompella-mpls-l2vpn) is established between two PE routers to provide connectivity between two customer sites.
Which two statements related to this deployment are true? (Choose two.)

A. BGP must be used for the control plane communications.
B. Kompella encapsulation is used in the data plane communications.
C. LDP must be used for the control plane communications.
D. Martini encapsulation is used in the data plane communications.

Answer: A, B

Explanation:

Junos OS substantially supports t RFC 4447, Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP). Martini uses directed LDP to signal the VPN label between the PE devices, Kompella uses BGP to signal the VPN label between the PE devices.

JN0-661 | To reduce the size of OSPF Area 100…

Question: 17

To reduce the size of OSPF Area 100, you configure the area with the no-summaries parameter. After committing this configuration change, you notice that an OSPF router in a remote area is no longer receiving Type 5 LSAs from an ASBR in Area 100.
Which statement is true in this scenario?

A. The ASBR in Area 100 generates Type 5 LSAs, and they are blocked by the ABR.
B. The ASBR in Area 100 generates Type 5 LSAs, and a virtual link is required for transport to other areas.
C. The ASBR in Area 100 generates Type 5 LSAs, and they are transported to Type 7 LSAs.
D. The ASBR in Area 100 generates Type 5 LSAs, and places them in its own database.

Answer: A

JN0-661 | In a carrier-of-carrier VPN model…

Question: 16

In a carrier-of-carrier VPN model, which type of network layer reachability information is used for the MP-BGP signaling between CE and PE routers?

A. inet-vpn
B. flow
C. labeled-unicast
D. unicast

Answer: A

Explanation/Reference:

In a Carrier-of-Carrier VPN environment, specify the inet-vpn address family and unicast traffic type to enable BGP to carry IPv4 network layer reachability information (NLRI) for VPN routes.

JN0-661 | An L2VPN (draft-kompella-mpls-l2vpn) is established…

Question: 15

An L2VPN (draft-kompella-mpls-l2vpn) is established between two PE routers to provide connectivity between two customer sites. Which two statements related to this deployment are true? (Choose two.)

A. BGP must be used for the control plane communications.
B. Kompella encapsulation is used in the data plane communications.
C. LDP must be used for the control plane communications.
D. Martini encapsulation is used in the data plane communications.

Answer: A,B

JN0-661 | Which two statements are associated…

Question: 14

Which two statements are associated with any-source multicast? (Choose two.)

A. Routes learn the source of the multicast traffic from the source address of the multicast traffic.
B. Routes learn the source of the multicast traffic from the receives.
C. Routes do not specify a specific source from which to receive traffic.
D. Receives select a specific source from which to receive traffic.

Answer: A,C

Explanation/Reference:

An any-source multicast (ASM) network must be able to determine the locations of all sources for a particular multicast group whenever there are interested listeners, no matter where the sources might be located in the network. In ASM, the key function of source discovery is a required function of the network itself. Multicast source discovery appears to be an easy process, but in sparse mode it is not. In dense mode, it is simple enough to flood traffic to every router in the network so that every router learns the source address of the content for that multicast group.

JN0-661 | You have configured an OSPF stub area…

Question: 13

You have configured an OSPF stub area. The routes in the stub area require external reachability.
Which statement explains how OSPF meets this requirement?

A. The ABR will generate a 0.0.0.0/0 martian route in the area.
B. The ABR will flood Type 5 LSAs into the area.
C. The ABR will flood Type 7 LSAs into the area.
D. The ABR will generate a 0.0.0.0/0 default route in the area.

Answer: D

JN0-661 | Packets traverse a Junos device configured for class…

Question: 12

Packets traverse a Junos device configured for class of service. Which two statements are true in this scenario? (Choose two.)

A. Packets are subject to traffic shapers before policers.
B. Packets are subject to policers before traffic shapers.
C. Packets are processed by behavior aggregate classifiers before multifield classifiers.
D. Packets are processed by multifield classifier before behavior aggregate classifiers.

Answer: A,C

Explanation:

A: Traffic shaping and policing can work in tandem. For example, a good traffic shaping scheme should make it easy for nodes inside the network to detect
misbehaving flows. This activity is sometimes called policing the traffic of the flow.
C: The simplest way to classify a packet is to use behavior aggregate (BA) classification.
For a specified interface, you can configure both a multifield classifier and a BA classifier without conflicts. Because the classifiers are always applied in sequential order, the BA classifier followed by the multifield classifier, any BA classification result is overridden by a multifield classifier if they conflict.