This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ] Export date:Sat Mar 15 9:00:17 2025 / +0000 GMT ___________________________________________________ Title: Practice on 2022 LATEST JN0-349 Exam Updated 112 Questions [Q26-Q49] --------------------------------------------------- Practice on 2022 LATEST JN0-349 Exam Updated 112 Questions Download Latest JN0-349 Dumps with Authentic Real Exam QA's Juniper JN0-349 Exam Certification Details: Recommended TrainingJunos Intermediate Routing (JIR)Junos Enterprise Switching (JEX)Duration90 minutesExam NameEnterprise Routing and Switching SpecialistExam Price$300 USDNumber of Questions65 Juniper JN0-349 Exam Topics: SectionObjectivesLayer 2 SecurityIdentify the concepts, benefits or operation of various Layer 2 protection or security featuresBPDU, loop or root protectionPort security, including MAC limiting, DHCP snooping, Dynamic ARP inspection (DAI) or IP source guardMACsecStorm control Identify the concepts, benefits or operation of Layer 2 firewall filtersFilter typesProcessing orderMatch criteria and actions Demonstrate knowledge how to configure, monitor, or troubleshoot Layer 2 securityProtectionPort securityStorm controlFirewall filter configuration and applicationOSPFDescribe the concepts, operation or functionality of OSPFLink-state databaseOSPF packet typesRouter IDAdjacencies and neighborsDesignated router (DR) and backup designated router (BDR)OSPF area and router typesRealmsLSA packet types Demonstrate knowledge how to configure, monitor or troubleshoot OSPFAreas, interfaces and neighborsAdditional basic optionsRouting policy applicationTroubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)Protocol Independent RoutingIdentify the concepts, operation or functionality of various protocol-independent routing componentsStatic, aggregate, and generated routesMartian addressesRouting instances, including RIB groupsLoad balancingFilter-based forwarding Demonstrate knowledge how to configure, monitor, or troubleshoot various protocol-independent routing componentsStatic, aggregate, and generated routesLoad balancingFilter-based forwardingBGPDescribe the concepts, operation or functionality of BGPBGP basic operationBGP message typesAttributesRoute/path selection processIBGP and EBGP functionality and interaction Demonstrate knowledge of how to configure, monitor, or troubleshoot BGPGroups and peersAdditional basic optionsRouting policy applicationTroubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)TunnelsIdentify the concepts, requirements or functionality of IP tunnelingTunneling applications and considerationsGREIP-IP Demonstrate knowledge of how to configure, monitor or troubleshoot IP tunnelsGREIP-IPTroubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)IS-ISDescribe the concepts, operation or functionality of IS-ISLink-state databaseIS-IS PDUsTLVsAdjacencies and neighborsLevels and areasDesignated intermediate system (DIS)Metrics Demonstrate knowledge of how to configure, monitor or troubleshoot IS-ISLevels, interfaces and adjacenciesAdditional basic optionsRouting policy applicationTroubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)   Q26. Which three statements are correct about the voice VLAN feature? (Choose three.)  It allows the access port to accept tagged voice and untagged data packets.  It allows you to apply independent CoS actions to data and voice packets.  It can be used with LLDP-MED to dynamically assign the VLAN ID value to IP phones.  It allows trunk ports to accept tagged voice and untagged data packets.  It must use the same VLAN ID as data traffic on a defined interface. A (not D): The Voice VLAN feature in EX-series switches enables access ports to accept bothdata (untagged) and voice (tagged) traffic and separate that traffic into different VLANs.B: To assign differentiated priority to Voice traffic, it is recommended that class of service (CoS) isconfigured prior to enabling the voice VLAN feature. Typically, voice traffic is treated with a higherpriority than common user traffic. Without differentiated treatment through CoS, all traffic,regardless of the type, is subject to the same delay during times of congestion.C: In conjunction with Voice VLAN, you can utilize Link Layer Discovery Protocol Media EndpointDiscovery (LLDP-MED) to provide the voice VLAN ID and 802.1p values to the attached IPphones. This dynamic method associates each IP phone with the appropriate voice VLAN andassigns the necessary802.1p values, which are used by CoS, to differentiate service for voicetraffic within a network.Q27. Your network is configured with dynamic ARP inspection (DAI) using the default parameters for all the DHCP and ARP related configurations. You just added a new device connected to a trunk port and configured it to obtain an IP address using DHCP.Which two statements are correct in this scenario? (Choose two.)  The DHCP server assign the IP addressing information to the new device.  DAI validates the ARP packets for the new device against the DHCP snooping database.  The SRP request and response packets for the new device will bypass DAI.  DHCP snooping adds the DHCP assigned IP address for the device to its database. Explanationhttps://www.juniper.net/documentation/en_US/junos/topics/concept/port-security-dhcp-snooping-els.htmlQ28. Which two sequences correctly describe the processing order of firewall filters on an EX Seriesswitch? (Choose two.)  router filter > VLAN filter > port filter > transmit packet  port filter > VLAN filter > router filter > transmit packet  receive packet > port filter > VLAN filter > router filter  receive packet > router filter > VLAN filter > port filter Q29. Click the Exhibit button.Referring to the exhibit, all users connected to the same VLAN can communicate with each other, but not with users on other VLANs in this network.What must be configured to enable communication between the VLANs?  The switch ports to which the users are connected should be configured as trunk ports.  A separate routing device is required to forward traffic between the configured VLANs.  A logical IRB interface must be created and assigned to each VLAN.  A single logical IRB interface must be created and assigned to all three VLANs. Q30. Click the Exhibit button.In the exhibit, each IP subnet in the campus environment is associated with a unique VLAN ID.Which action will ensure that Host C will communicate with Host A and Host B?  Configure an IRB interface for each VLAN and associate it with its corresponding VLAN  Configure a port-based ACL that permits inter-VLAN routing for all configured VLANs  Configure all switch ports connecting to the host devices as trunk ports associated with all VLANs  Configure all switch ports connecting to the host devices as access ports associated with a common VLAN Q31. Click the Exhibit button.Referring to the exhibit, which configuration change is needed for an IS-IS Level 1 adjacency between R1 and R2?  Configure the lo0 family ISO address 49.0002.0010.0042.0002.00 on R2  Configure the lo0 family ISO address 49.0002.0010.0042.0002.00 on R1  Enable Level 2 on R1’s ge-0/0/1 interface  Disable Level 2 on R2’s ge-0/0/1 interface Q32. Which two statements are correct regarding the root bridge election process when using STP?(Choose two )  A lower system MAC address is preferred  A higher bridge priority is preferred  A lower bridge priority is preferred  A higher system MAC address is preferred Q33. A number of reports from end users indicate that internal and external communications areintermittent and not reliable.You verified the status of the switch ports and have determined that they are up and operational.You also noticed a very high level of link bandwidth utilization on those same ports.The current topology of the affected environment is shown in the exhibit.What would be the cause of the reported issues?  A lack of port-based ACLs filtering the traffic flows.  A malformed route-based ACL Improperly filtering traffic flows.  A misconfigured interior gateway protocol (IGP).  A lack of a loop-prevention mechanism or protocol. Q34. What are two benefits of 802.3ad link aggregation? (Choose two.)  It increases bandwidth.  It ensures symmetrical paths.  It simplifies interface configuration.  It creates physical layer redundancy. Q35. Click the Exhibit button.Referring to the output shown in the exhibit, which statement is correct?  11.0.0.108/32 is being per-flow load-balanced  11.0.0.102/32 is being per-packet load-balanced  11.0.0.102/32 is being per-flow load-balanced  11.0.0.108/32 is being per-packet load-balanced Q36. What are two interarea OSPF LSA types? (Choose two.)  Type 1 router LSAs  Type 3 summary LSAs  Type 4 ASBR summary LSAs  Type 2 network LSAs Q37. Which two routes belong to the 172.16.0.0/22 aggregate route? (Choose two.)  172.16.4.0/24  172.16.0.0/24  172.16.5.0/24  172.16.3.0/24 Q38. Which Junos feature allows you to combine multiple interfaces into a single bundle?  VRRP  Virtual Chassis  LAG  NSB Q39. Exhibit.Referring to the exhibit, Router-1 and Router-2 are failing to form an IS-IS adjacency.What should you do to solve the problem?  Remove the overloaded statement from Router-1.  Change the IP subnet masks to match on the ge-0/0/2 interfaces of both routers.  Remove the ISO address from ge-0/0/2 on Router-1.  Change the ISO areas on the Io0 interfaces to match on both routers. Q40. You have a conference room with an open network port that is used by employees to connect to the network.You are concerned about rogue switches being connected to this portWhich two features should you enable on your switch to limit access to this port? (Choose two.)  DHCP snooping  dynamic ARP inspection  MAC limiting  802.1X Q41. Referring to the exhibit, the local router should have an IS-IS adjacency with a neighboring router,but the adjacency never establishes correctly.What should you do to solve the problem?  Disable wide metrics.  Change the local IS-IS area ID to 49.0002.  Disable level 1 for the interfaces.  Disable level 2 for the interfaces. Q42. Exhibit.Referring to the exhibit, all users connected to the same VLAN can communicate with each other, but not with users on other VLANs in this network.What must be configured to enable communication between the VLANs?  The switch ports to which the users are connected should be configured as trunk ports.  A logical IRB interface must be created and assigned to each VLAN.  A single logical IRB interface must be created and assigned to all three VLANs  A separate routing device is required to forward traffic between the configured VLANs. Q43. Which area is reserved for the OSPF backbone?  Area 0.0.0.0  Area 1.1.1.1  Area 2.2.2.2  Area .3.3.3.3 Q44. Click the Exhibit button.Referring to the exhibit, why is the route for 10.5.5.5 hidden?  It is a martian route.  It has an invalid community.  It is an L3VPN route.  The next hop cannot be resolved. Q45. What are two characteristics of OSPF ABRs? (Choose two.)  ABRs transmit routing information between the backbone and other areas.  ABRs cannot be part of the backbone and another area at the same time.  ABRs inject information from outside the OSPF domain.  ABRs link two OSPF areas Area border router (ABR): An OSPF router with links in two areas, the ABR is responsible forconnecting OSPF areas to the backbone. It transmits network information between the backboneand other areas.Q46. Click the Exhibit button.Referring to the exhibit, the local router should have an IS-IS adjacency with a neighboring router, but the adjacency never establishes correctly.What should you do to solve the problem?  Disable level 2 for the interfaces.  Disable level 1 for the interfaces.  Disable wide metrics.  Change the local IS-IS area ID to 49.0002. Q47. You are enabling dynamic ARP inspection on an EX4300 switch Which service is enabled by default in this scenario?  DHCP snooping  persistent MAC learning  MAC limiting  IP Source Guard Q48. You manage the layer 2 network shown in the exhibit, You experience a failure on the ge-0/0/0link between Swicth-1 and Switch-2.Which statement is correct about expected behavior?  Switch-2 will remove itself from the RSTP topology.  Swicth-2’s ge0/0/2 port role and state will transition to root and forwarding.  Switch-2 will become the root bridge for a separate RSTP topology.  Switch-2’s ge0/0/2 port role and state will remain as designated and forwarding. Q49. You want to use filter-based forwarding (FBF) to forward traffic sourced from subnet 10.0.0.0/24to a specific destination.Which two routing instance types would enable you to accomplish this task? (Choose two.)  virtual routing and forwarding  virtual router  forwarding  virtual switch https://www.juniper.net/documentation/en_US/junos/topics/example/firewall-filter-option-filter-based-forwarding-example.html Loading … Authentic JN0-349 Exam Dumps PDF - Sep-2022 Updated: https://www.exams4sures.com/Juniper/JN0-349-practice-exam-dumps.html --------------------------------------------------- Images: https://free.exams4sures.com/wp-content/plugins/watu/loading.gif https://free.exams4sures.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-09-02 15:39:04 Post date GMT: 2022-09-02 15:39:04 Post modified date: 2022-09-02 15:39:04 Post modified date GMT: 2022-09-02 15:39:04