1. Home
  2. Juniper
  3. JN0-351 Exam Info
  4. JN0-351 Exam Questions

Master Juniper Enterprise Routing and Switching with JN0-351 Specialist Prep

Aspiring network pros, your gateway to Juniper excellence awaits! Conquer the JN0-351 exam with our cutting-edge practice questions, tailored for the ambitious Specialist in Enterprise Routing and Switching. Don't let exam anxiety hold you backā€”our meticulously crafted materials are your secret weapon. Imagine confidently navigating complex network topologies, impressing employers, and unlocking lucrative opportunities in SDN and cloud infrastructure. With PDF, web-based, and desktop options, you'll find the perfect fit for your learning style. Join thousands of successful candidates who've trusted our industry-leading prep tools. Time is ticking, and top positions are filling fast. Invest in your future today and transform from exam taker to network virtuoso. Your Juniper certification journey starts here!

Page: 1 /
Total 65 questions
Get Free Questions & Answers PDF
Question 1

You are troubleshooting a BGP routing issue between your network and a customer router and are reviewing the BGP routing policies. Which two statements are correct in this scenario? (Choose two.)


Correct : C, D

In BGP, routing policies are used to control the flow of routing information between BGP peers1.

Option C suggests that import policies are applied after the RIB-In table.This is correct because import policies in BGP are applied to routes that are received from a BGP peer, before they are installed in the local BGP Routing Information Base (RIB-In)1.The RIB-In is a database that stores all the routes that are received from all peers1.

Option D suggests that export policies are applied after the RIB-Local table.This is correct because export policies in BGP are applied to routes that are being advertised to a BGP peer, after they have been selected from the local BGP Routing Information Base (RIB-Local)1.The RIB-Local is a database that stores all the routes that the local router is using1.

Therefore, options C and D are correct.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

You are asked to connect an IP phone and a user computer using the same interface on an EX Series switch. The traffic from the computer does not use a VLAN tag, whereas the traffic from the IP phone uses a VLAN tag.

Which feature enables the interface to receive both types of traffic?


Correct : D

The feature that enables an interface on an EX Series switch to receive both untagged traffic (from the computer) and tagged traffic (from the IP phone) is thevoice VLAN12.

The voice VLAN feature in EX-series switches enables access ports to accept both data (untagged) and voice (tagged) traffic and separate that traffic into different VLANs12.This allows the switch to differentiate between voice and data traffic, ensuring that voice traffic can be treated with a higher priority12. Therefore, option D is correct.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Exhibit

Which command displays the output shown in the exhibit?


Correct : B

The output shown in the exhibit is a brief display of the Ethernet switching table, which shows the learned Layer 2 MAC addresses for each VLAN and interface1.

The commandshow ethernet-switching tabledisplays the Ethernet switching table with brief information, such as the destination MAC address, the VLAN name, the forwarding state, and the interface name1.

The commandshow route forwarding-tabledisplays the routing table information for each protocol family, such as inet, inet6, mpls, iso, and so on2. It does not show the Ethernet switching table or the MAC addresses.

The commandshow ethernet-switching table extensivedisplays the Ethernet switching table with extensive information, such as the destination MAC address, the VLAN name, the forwarding state, the interface name, the VLAN index, and the tag type1. It shows more details than the brief output shown in the exhibit.

The commandshow route forwarding-table family ethernet-switchingdisplays the routing table information for the ethernet-switching protocol family, which shows the destination MAC address, the next-hop MAC address, and the interface name3. It does not show the VLAN name or the forwarding state.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

You deployed a new EX Series switch with DHCP snooping enabled and you do not see any entries in the snooping databases for an interface. Which two Juniper configurations for that interface caused this issue? (Choose two.)


Correct : A, C

Ais correct because the interface is configured as a disabled port. A disabled port does not forward any traffic, including DHCP packets.Therefore, DHCP snooping cannot learn any MAC addresses or lease information from a disabled port1.

Cis correct because the interface is configured as a trunk port.By default, all trunk ports on the switch are trusted for DHCP snooping2. This means that DHCP snooping does not inspect or filter any DHCP packets received on a trunk port.Therefore, DHCP snooping does not add any entries to the snooping database for a trunk port2.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

You have DHCP snooping enabled but no entries are automatically created in the snooping database for an interface on your EX Series switch. What are two reasons for the problem? (Choose two.)


Correct : B, C

The DHCP snooping feature in Juniper Networks' EX Series switches works by building a binding database that maps the IP address, MAC address, lease time, binding type, VLAN number, and interface information1.This database is used to filter and validate DHCP messages from untrusted sources1.

However, there are certain conditions that could prevent entries from being automatically created in the snooping database for an interface:

MAC limiting: If MAC limiting is enabled on the interface, it could potentially interfere with the operation of DHCP snooping.MAC limiting restricts the number of MAC addresses that can be learned on a physical interface to prevent MAC flooding attacks1. This could inadvertently limit the number of DHCP clients that can be learned on an interface, thus preventing new entries from being added to the DHCP snooping database.

Static IP address: If the device connected to the interface is configured with a static IP address, it will not go through the DHCP process and therefore will not have an entry in the DHCP snooping database1.The DHCP snooping feature relies on monitoring DHCP messages to build its database1, so devices with static IP addresses that do not send DHCP messages will not have their information added.

Therefore, options B and C are correct.Options A and D are not correct because performing a DHCPRELEASE would simply remove an existing entry from the database1, and Dynamic ARP inspection (DAI) uses the information stored in the DHCP snooping binding database but does not prevent entries from being created1.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 13   
Total 65 questions