JN0-664 Practice Test Questions

105 Questions


You are configuring a Layer 3 VPN between two sites. You are configuring the vrf-target target : 65100:100 statement in your routing instance. In this scenario, which two statements describe the vrf-target configuration? (Choose two.)


A. This value is used to identify BGP routes learned from the local CE device.


B. This value is used to identify BGP routes learned from the remote PE device.


C. This value is used to add a target community to BGP routes advertised to the local CE device.


D. This value is used to add a target community to BGP routes advertised to the remote PE device.





B.
  This value is used to identify BGP routes learned from the remote PE device.


D.
  This value is used to add a target community to BGP routes advertised to the remote PE device.


Explanation:

The `vrf-target` statement in a Layer 3 VPN configuration is used to control the import and export of VPN routes by attaching a target community to the routes. This helps in defining which VPN routes should be imported into or exported from a particular VRF (Virtual Routing and Forwarding) instance.

1. Understanding VRF Target

  • The `vrf-target` statement specifies the extended community attributes (route targets) that are used to control the import and export of routes in a VRF.
  • These attributes help in identifying which routes should be shared between different VRFs, particularly across different PE (Provider Edge) devices.

2. Statements Analysis
  • This value is used to identify BGP routes learned from the local CE device incorrect. The `vrf-target` attribute is not used to identify routes learned from the local CE device. It is used to manage routes between PE devices and within the provider's MPLS network.
  • This value is used to identify BGP routes learned from the remote PE device.
  • Correct. The `vrf-target` value helps in identifying which routes from remote PE devices should be imported into the local VRF. It essentially acts as a filter for importing BGP routes with matching target communities.
  • This value is used to add a target community to BGP routes advertised to the local CE device.
  • Incorrect. Routes advertised to the local CE device do not use the `vrf-target` attribute. Instead, these routes are typically managed within the local VRF routing table.
  • This value is used to add a target community to BGP routes advertised to the remote PE device.
  • Correct. When advertising routes from the local PE to remote PE devices, the `vrf-target` value is added to these routes. This target community ensures that the correct routes are shared across the VPN.

Conclusion:

The correct statements about the `vrf-target` configuration in a Layer 3 VPN scenario are:

This value is used to identify BGP routes learned from the remote PE device.

This value is used to add a target community to BGP routes advertised to the remote PE device.

References:

Juniper Networks Documentation on VRF Target: [VRF Target Configuration
(https://www.juniper.net/documentation/en_US/junos/topics/topic-map/layer-3-vpns.html)

MPLS and VPN Architectures by Ivan Pepelnjak and Jim Guichard

Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )


A. Rewrite rules


B. Behavior aggregate classifiers


C. Traffic shapers


D. Fixed classifiers


E. Multifield Classifiers





B.
  Behavior aggregate classifiers


D.
  Fixed classifiers


E.
  Multifield Classifiers


Explanation:

Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as: Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.

Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.

Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters. Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.

Which two statements are correct about a sham link? (Choose two.)


A. It creates an OSPF multihop neighborship between two PE routers.


B. It creates a BGP multihop neighborship between two PE routers.


C. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes


D. The PEs exchange Type 3 OSPF LSAs instead of Type 1 OSPF LSAs for the L3VPN routes.





A.
  It creates an OSPF multihop neighborship between two PE routers.


C.
  The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes


Explanation:

A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring an intra-area back door link over the VPN backbone. A sham link creates an OSPF multihop neighborship between the PE routers using TCP port 646. The PEs exchange Type 1 OSPF LSAs instead of Type 3 OSPF LSAs for the L3VPN routes, which allows OSPF to use the correct metric for route selection1.

Which two statements are correct about VPLS tunnels? (Choose two.)


A. LDP-signaled VPLS tunnels only support control bit 0.


B. LDP-signaled VPLS tunnels use auto-discovery to provision sites


C. BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.


D. BGP-signaled VPLS tunnels require manual provisioning of sites.





A.
  LDP-signaled VPLS tunnels only support control bit 0.


C.
  BGP-signaled VPLS tunnels can use either RSVP or LDP between the PE routers.


Explanation:

https://www.juniper.net/documentation/us/en/software/nce/feature-guide-virtual-private-lan-service/topics/task/vpls-ldp-signaling-solutions.html

https://www.juniper.net/documentation/us/en/software/junos/vpn-l2/topics/concept/vpns-configuring-vpls-routing-instances.html#id-11510150__id-11568648

When using OSPFv3 for an IPv4 environment, which statement is correct?


A. OSPFv3 only supports IPv4.


B. OSPFv3 supports both IPv6 and IPv4, but not in the same routing instance.


C. OSPFv3 is not backward compatible with IPv4


D. OSPFv3 supports IPv4 only on interfaces with family inet6 defined





D.
  OSPFv3 supports IPv4 only on interfaces with family inet6 defined


Which two statements about IS-IS are correct? (Choose two.)


A. PSNPs are used to acknowledge a received LSP.


B. CSNPs are used to acknowledge a received LSP.


C. CSNPs are used to request a missing LSP.


D. PSNPs are used to request a missing LSP.





A.
  PSNPs are used to acknowledge a received LSP.


D.
  PSNPs are used to request a missing LSP.


Explanation:

Intermediate System to Intermediate System (IS-IS) is a link-state routing protocol used to move information efficiently within a computer network. It uses a series of Protocol Data Units (PDUs) to manage the network's topology and ensure consistency across all routers in the network. Specifically, Link State PDUs (LSPs), Complete Sequence Number PDUs (CSNPs), and Partial Sequence Number PDUs (PSNPs) play crucial roles in this process.

1. PSNPs (Partial Sequence Number PDUs):

Acknowledge a received LSP: PSNPs are used to acknowledge the receipt of LSPs. When a router receives an LSP, it sends a PSNP back to the sender to confirm that the LSP has been received.

Request a missing LSP: PSNPs are also used to request missing LSPs. If a router identifies a missing LSP based on sequence numbers, it can send a PSNP to request the specific LSP from its neighbors.

2. CSNPs (Complete Sequence Number PDUs):

 Summarize LSPs: CSNPs are used to summarize all the LSPs known to a router. They are typically sent at regular intervals to provide a complete list of LSPs in a database. They are not used to acknowledge or request specific LSPs but provide an overview of all LSPs for database synchronization.

Based on this understanding, let's evaluate the statements:

A. PSNPs are used to acknowledge a received LSP.

Correct. PSNPs serve the purpose of acknowledging LSPs received from other routers.

B. CSNPs are used to acknowledge a received LSP.

Incorrect. CSNPs are not used for acknowledging LSPs; they are used to provide a summary of all LSPs.

C. CSNPs are used to request a missing LSP.

Incorrect. CSNPs are not used to request missing LSPs; this is the role of PSNPs.

D. PSNPs are used to request a missing LSP.

Correct. PSNPs are used to request specific missing LSPs when a router detects that it is missing information.

Conclusion:

The correct statements about IS-IS are:

A. PSNPs are used to acknowledge a received LSP.

D. PSNPs are used to request a missing LSP.

References:

Juniper Networks Documentation on IS-IS: [IS-IS Overview](https://www.juniper.net/documentation/en_US/junos/topics/concept/is-is-routing-overview.html)

RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments: [RFC 1195](https://tools.ietf.org/html/rfc1195) which details the operation and use of IS-IS, including the roles of PSNPs and CSNPs.

Which two statements describe PIM-SM? (Choose two)


A. Routers with receivers send join messages to their upstream neighbors.


B. Routers without receivers must periodically prune themselves from the SPT.


C. Traffic is initially flooded to all routers and an S,G is maintained for each group


D. Traffic is only forwarded to routers that request to join the distribution tree.





A.
  Routers with receivers send join messages to their upstream neighbors.


D.
  Traffic is only forwarded to routers that request to join the distribution tree.


Explanation:

PIM sparse mode (PIM-SM) is a multicast routing protocol that uses a pull model to deliver multicast traffic. In PIM-SM, routers with receivers send join messages to their upstream neighbors toward a rendezvous point (RP) or a source-specific tree (SPT). The RP or SPT acts as the root of a shared distribution tree for a multicast group. Traffic is only forwarded to routers that request to join the distribution tree by sending join messages. PIM-SM does not flood traffic to all routers or prune routers without receivers, as PIM dense mode does.

Which two statements are correct regarding bootstrap messages that are forwarded within a PIM sparse mode domain? (Choose two.)


A. Bootstrap messages are forwarded only to routers that explicitly requested the messages within the PIM sparse-mode domain


B. Bootstrap messages distribute RP information dynamically during an RP election.


C. Bootstrap messages are used to notify which router is the PIM RP


D. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.





B.
  Bootstrap messages distribute RP information dynamically during an RP election.


D.
  Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain.


Explanation:

Bootstrap messages are PIM messages that are used to distribute rendezvous point (RP) information dynamically during an RP election. Bootstrap messages are sent by bootstrap routers (BSRs), which are routers that are elected to perform the RP discovery function for a PIM sparse-mode domain. Bootstrap messages contain information about candidate RPs and their multicast groups, as well as BSR priority and hash mask length. Bootstrap messages are forwarded to all routers within a PIM sparse-mode domain using hop-by-hop flooding.

Which two statements are correct about the customer interface in an LDP-signaled pseudowire? (Choose two)


A. When the encapsulation is vlan-ccc or extended-vlan-ccc, the configured VLAN tag is not included in the control plane LDP advertisement


B. When the encapsulation is ethernet-ccc, only frames without a VLAN tag are accepted in the data plane


C. When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement


D. When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.





C.
  When the encapsulation is vLan-ccc or extended-vlan-ccc, the configured VLAN tag is included in the control plane LDP advertisement


D.
  When the encapsulation is ethemet-ccc, tagged and untagged frames are both accepted in the data plane.


Explanation:

The customer interface in an LDP-signaled pseudowire is the interface on the PE router that connects to the CE device. An LDP-signaled pseudowire is a type of Layer 2 circuit that uses LDP to establish a point-to-point connection between two PE routers over an MPLS network. The customer interface can have different encapsulation types depending on the type of traffic that is carried over the pseudowire. The encapsulation types are ethernet-ccc, vlan-ccc, extended-vlan-ccc, atm-ccc, frame-relay-ccc, ppp-ccc, cisco-hdlc-ccc, and tcc-ccc. Depending on the encapsulation type, the customer interface can accept or reject tagged or untagged frames in the data plane, and include or exclude VLAN tags in the control plane LDP advertisement. The following table summarizes the behavior of different encapsulation types:

You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task?


A. Configure the ignore-attached-bit parameter on all L2 routers.


B. Configure all routers to allow wide metrics.


C. Configure all routers to be L1.


D. Configure the ignore-attached-bit parameter on all L1 routers





D.
  Configure the ignore-attached-bit parameter on all L1 routers


Explanation:

The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1 routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their routing tables.

In OSPF, how does a router ensure that LSAs advertised to a neighboring router are received?


A. LSA flooding guarantees that all routers will receive them successfully.


B. LSAs are sent over a TCP connection.


C. LSAs are acknowledged by the neighboring router.


D. LSAs are advertised with an acknowledgement bit.





C.
  LSAs are acknowledged by the neighboring router.


Explanation:

OSPF Protocol Basics:

OSPF (Open Shortest Path First) is a link-state routing protocol.

Routers exchange LSAs (Link-State Advertisements) to share topology information.

LSA Acknowledgment Mechanism:

OSPF uses a reliable mechanism to ensure LSAs are received.

When a router sends an LSA to a neighbor, it expects an acknowledgment (ACK).

If an ACK is not received within a certain period, the router will retransmit the LSA.

Acknowledgment Process:

LSAs are sent over OSPF's reliable transport, which ensures delivery through acknowledgments.

This mechanism helps to maintain consistent and up-to-date topology databases across routers.

References:

OSPF RFC 2328

Understanding OSPF Operations

In which two ways does OSPF prevent routing loops in multi-area networks? (Choose two.)


A. All areas are required to connect as a full mesh.


B. The LFA algorithm prunes all looped paths within an area.


C. All areas are required to connect to area 0.


D. The SPF algorithm prunes looped paths within an area.





C.
  All areas are required to connect to area 0.

D.
  The SPF algorithm prunes looped paths within an area.


Page 1 out of 9 Pages