Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Juniper JN0-304 Exam - Cheat-Test.com

Free JN0-304 Sample Questions:

1. Routers A and B have an OC12c and a GE link between them and are running OSPF over both of these links. Which statement is correct, assuming the default JUNOS software OSPF metric calculation?
A. There are two equal cost paths between A and B.
B. The GE link is the preferred path between A and B.
C. The OC12c link is the preferred path between A and B.
D. Manual metric assignment must be configured to determine the outcome.
Answer: A

2. What is the default function of a secondary path in MPLS?
A. to act as an equal-cost path to the primary path
B. to enable another LSP for load balancing
C. to act as a diverse backup path to the primary path
D. to allow the use of explicit path selection via EROs
Answer: C

3. How long is an IPv6 address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Answer: C

4. Which three are well-known mandatory BGP attributes? (Choose three.)
A. Origin
B. AS path
C. Next hop
D. Community
E. Multiple exit discriminator
Answer: ABC

5. In which two ways can you influence how downstream LSRs treat MPLS traffic? (Choose two.)
A. Use an EXP rewrite table.
B. Use a DSCP rewrite table.
C. Statically assign a CoS value to an LDP-signaled LSP.
D. Statically assign a CoS value to an RSVP-signaled LSP.
Answer: AD

6. Which three authentication options does IS-IS support? (Choose three.)
A. MD5
B. DES
C. Kerberos
D. unauthenticated
E. simple password
Answer: ADE

7. Two Label-Switched Paths called LSP A and LSP B have been configured on a router. LSP A has been configured with a hold-priority of 3. There is insufficient reservable bandwidth along the path to accomodate both LSPs reservation requirements. Which setup priority must LSP B have to pre -empt LSP A and use its bandwidth?
A. 2
B. 3
C. 4
D. 7
Answer: A

8. Which configuration defines a BGP route reflector?
A. group cluster-1 {
type external;
local-address 192.168.56.1;
cluster-list 1.1.1.1;
neighbor 192.168.48.1;
neighbor 192.168.52.1;
}
B. group cluster-1 {
type internal;
local-address 192.168.56.1;
cluster 1.1.1.1;
client 192.168.48.1;
client 192.168.52.1;
}
C. group cluster-1 {
type cluster;
local-address 192.168.56.1;
cluster-list 1.1.1.1;
neighbor 192.168.48.1;
neighbor 192.168.52.1;
}
D. group cluster-1 {
type external;
local-address 192.168.56.1;
cluster 1.1.1.1;
neighbor 192.168.48.1;
neighbor 192.168.52.1;
}
Answer: B

9. Given the following policy, what happens when the 1.1/17 route is evaluated?
[edit policy-options] policy-statement test {
from {
route-filter 0/0 orlonger accept;
route-filter 1.1/17 upto /24 reject;
route-filter 1.1/18 exact;
}
then {
metric 6; accept;
}
}
A. The route does not match this policy.
B. The route is accepted.
C. The route is rejected.
D. The route is accepted with a metric of 6.
Answer: A

10. Given the following policy:
[edit policy-options] policy-statement my-filter {
term first {
from {
route-filter 192.168.0.0/16 orlonger accept;
route-filter 192.168.1.0/24 exact accept;
route-filter 192.168.2.0/24 exact;
} then {
metric 10; accept;
} term second {
then {
metric 20; accept; }
policy-statement main {
term change-attributes {
from { policy my-filter; }
then accept;
}
term default {
then reject; }
[edit protocols] bgp { export main; }
Which action occurs when the static route 192.168.0.0/25 is evaluated by the policy main -policy?
A. The route is not advertised into BGP.A.The route is not advertised into BGP.
B. The route is advertised into BGP with metric 10.B.The route is advertised into BGP with metric 10.
C. The route is advertised into BGP with metric 20.C.The route is advertised into BGP with metric 20.
D. The route is advertised into BGP with default metric.D.The route is advertised into BGP with default metric.
Answer: D

11. OSPFv3 is used to route which type of packets?
A. IPv4
B. IPv6
C. MPLS
D. IS-IS
Answer: B

12. Which three are used to create a separate multicast and unicast forwarding topology on a Juniper Networks router? (Choose three.)
A. MBGP
B. RIB groups
C. firewall filters
D. routing policy
E. filter based forwarding (FBF)
Answer: ABD

13. What is the correct configuration of Anycast R P on the loopback interface, assuming a shared anycast address of 10.1.1.1?
A. [edit]
interfaces {
...
lo0 {
unit 0 {
family inet {
address 10.1.1.1/32
primary;
address 169.144.10.1/32;
B. [edit]
interfaces {
...
lo0 {
unit 0 {
family inet {
address 10.1.1.1/32
preferred;
address 169.144.10.1/32;
C. [edit]
interfaces {
...
lo0 {
unit 0 {
family inet {
address 169.144.10.1/32
primary;
address 10.1.1.1/32;
D. [edit]D. [edit]
interfaces {
...
lo0 {
unit 0 {
family inet {
address 169.144.10.1/32
preferred;
address 10.1.1.1/32;
Answer: C

14. Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true? (Choose two.)
A. TLV 22 supports wide metrics.
B. TLV 2 is only used in Level 1 routers.
C. TLV 22 displays the neighbor's extended areas.
D. Only TLV 22 can support the inclusion of sub-TLVs.
Answer: AD

15. When using OSPF as your IGP, which operational command must be enabled to populate the TED for CSPF calculations?
A. cspf enable
B. disable no-cspf
C. traffic-engineering
D. enable traffic-engineering-database
Answer: C

16. What is the use of MSDP across multiple PIM domains?
A. It scopes multicast traffic.
B. It prevents multicast routing loops.
C. It advertises active multicast sources.
D. It advertises RPs to all downstream routers.
Answer: C

17. In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? (Choose two.)
A. MSDP
B. Routing policy
C. Administrative scoping
D. Bootstrap export policy
Answer: BC

18. When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true? (Choose two.)
A. CPE VPNs require dedicated VPN aware hardware at customer site, PPVPN does not.
B. PPVPNs require dedicated VPN aware hardware at customer site, CPE VPNs does not.
C. CPE VPNs scale better than PPVPNs as they do not require a per site configuration on the CPE.
D. PPVPNs scale better than CPE VPNs as they do not require a per site configuration on the CPE.
Answer: AD

19. According to JUNOS software route selection al gorithm, which IS-IS route type is most preferred?
A. Level 1 internal routes
B. Level 1 external routes
C. Level 2 internal routes
D. Level 2 external routes
Answer: A

20. Which setting in JUNOS software forces a bgp speaker to wait for a bgp neighbor to initiate a bgp session?
A. wait
B. hold
C. passive
D. authenticate
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved