Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Juniper JN0-650 Practice Exam with Questions & Answers | Set: 2

Questions 11

You are troubleshooting a multicast deployment in a network. Some multicast groups operate in PIM-ASM mode and others operate in PIM-SSM mode. While troubleshooting, you note the following:

- The network uses IGMPv2 for some segments and IGMPv3 for others.

- For group 232.1.1.1, receivers know the exact source IP of the multicast sender

- For group 239.10.10.10. receivers do not know the source address in advance.

Which two statements correctly describe the operational differences between these two modes in Junos OS? (Choose two.)

Options:
A.

PIM-ASM supports multiple active sources for a group without requiring receivers to know them in advance, whereas PIM-SSM requires explicit source knowledge

B.

In PIM-ASM. the DR first sends a PIM register message to the RP before switching to the shortest-path tree.

C.

PIM-SSM requires an RP for initial joins, whereas PIM-ASM can operate without one.

D.

PIM-SSM relies on IGMPv3 to signal both the source and the group in the join message, bypassing the RP entirely.

Juniper JN0-650 Premium Access
Questions 12

You are adding a new QFX Series switch to an EVPN-VXLAN IP fabric.

In this scenario, which two statements are correct? (Choose two.)

Options:
A.

The encapsulation vxlan setting is configured under the protocols evpn hierarchy.

B.

The family vpls signaling address family is configured under the BGP protocol.

C.

The family evpn signaling address family is configured under the BGP protocol.

D.

The loopback interface must be advertised using the BGP protocol.

Questions 13

Which statement accurately describes the operation of OSPF within the Junos OS?

Options:
A.

OSPF calculates routes using a distance vector algorithm.

B.

OSPF is used for routing information and neighbor discovery within a single autonomous system (AS).

C.

OSPF does not automatically advertise directly connected routes.

D.

OSPF is used for routing information and neighbor discovery between multiple autonomous systems.

Questions 14

Exhibit

JN0-650 Question 14

Your network receives the full Internet BGP routing table from two different ISPs. You want your local routers to use Provider A to forward all Internet traffic as long as Provider A is available.

Referring to the exhibit, which two actions would satisfy this requirement? (Choose two.)

Options:
A.

Use a routing policy to set the local preference attribute value higher for the routes that are learned by R1

B.

Use a routing policy to set the local preference attribute value higher for the routes that are learned by R2.

C.

Use a routing policy to set the local preference attribute value lower for the routes that are learned by R2.

D.

Use a routing policy to set the local preference attribute value lower for the routes that are learned by R1.

Questions 15

You are asked to establish authentication for users connecting to the corporate network. You must ensure that only corporate devices that are identified by MAC addresses are allowed to authenticate and connect Authentication must be handled by a centralized database.

Which authentication method would you implement in this scenario?

Options:
A.

MAC RADIUS

B.

captive portal

C.

single-secure supplicant mode

D.

single supplicant mode

Questions 16

Exhibit.

JN0-650 Question 16

Referring to the exhibit, what is required for the BGP peering to establish?

Options:
A.

Configure neighbor 172.16.1.1 multipath under the ext-peers hierarchy.

B.

Configure neighbor 10.10.20. l multihop under the ext-peers hierarchy

C.

Configure neighbor lo.io.io.i multihop under the ext-peers hierarchy

D.

Configure neighbor 172.16.1.1 multihop under the ext-peers hierarchy

Questions 17

You are deploying IP phones in your enterprise networks. When plugged in. the IP phones must automatically be provided with their geographic location details by the EX Series switches.

In this scenario, which protocol should be used to enable this behavior?

Options:
A.

CDP

B.

LLDP-MED

C.

LLDP

D.

MP-BGP

Questions 18

Your organization uses 802 1X with a RADIUS server. If the RADIUS server stops responding, you want the fallback action to continue to permit access for devices that currently have authorization but deny any new access attempts.

Which fallback action provides this capability?

Options:
A.

deny

B.

vlan-name

C.

permit

D.

use-cache

Questions 19

Which two statements correctly describe how EX Series switches use captive portal for Layer 2 authentication? (Choose two.)

Options:
A.

The captive portal is the default Layer 2 authentication method that is applied before other methods such as 802 1X or MAC RADIUS.

B.

The captive portal authentication allowlist works for devices that do not have HTTP capabilities.

C.

The captive portal is configured on Layer 3 interfaces and does not participate in Layer 2 authentication on EX Series switches.

D.

The captive portal is used as a fallback mechanism for clients that fail 802.1X or MAC RADIUS authentication.