2017 New Version | JN0-346 Exam Dumps with PDF and VCE FREE Released in www.Braindump2go.com Today!
100% Real Exam Questions! 100% Exam Pass Guaranteed!
1.|2017 New Version JN0-346 Exam Dumps (PDF & VCE) 75Q&As Download:
2.|2017 New Version JN0-346 Exam Questions & Answers Download:
What information is included in the DHCP snooping database? (Choose two.)
A. client MAC address
B. DHCP server address
C. DHCP options
When DHCP snooping is enabled, the lease information from the server is used to create the DHCP snooping table, also known as the binding table.
The table shows current IP-MAC bindings, as well as lease time, type of binding, names of associated VLANs, and associated interface.
Which three statements are correct about the voice VLAN feature? (Choose three.)
A. It allows the access port to accept tagged voice and untagged data packets.
B. It allows you to apply independent CoS actions to data and voice packets.
C. It can be used with LLDP-MED to dynamically assign the VLAN ID value to IP phones.
D. It allows trunk ports to accept tagged voice and untagged data packets.
E. It must use the same VLAN ID as data traffic on a defined interface.
A (not D): The Voice VLAN feature in EX-series switches enables access ports to accept both data (untagged) and voice (tagged) traffic and separate that traffic into different VLANs.
B: To assign differentiated priority to Voice traffic, it is recommended that class of service (CoS) is configured prior to enabling the voice VLAN feature. Typically, voice traffic is treated with a higher priority than common user traffic. Without differentiated treatment through CoS, all traffic, regardless of the type, is subject to the same delay during times of congestion.
C: In conjunction with Voice VLAN, you can utilize Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) to provide the voice VLAN ID and 802.1p values to the attached IP phones. This dynamic method associates each IP phone with the appropriate voice VLAN and assigns the necessary802.1p values, which are used by CoS, to differentiate service for voice traffic within a network.
Which two statements are correct about aggregate routes in the Junos OS? (Choose two.)
A. An active route can contribute only to a single aggregate route.
B. Only one aggregate route can be configured for each destination prefix.
C. An aggregate route has a default next hop of an IP address.
D. An aggregate route always shows as active in the routing table.
A route can contribute only to a single aggregate route.
You can configure only one aggregate route for each destination prefix.
Which device is used to separate collision domains?
Modern wired networks use a network switch to reduce or eliminate collisions.
By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.
What are two types of IS-IS PDUs? (Choose two.)
A. open PDU
B. VRF PDU
C. hello PDU
D. link-state PDU
IS-IS hello (IIH) PDUs broadcast to discover the identity of neighboring IS-IS systems and to determine whether the neighbors are Level 1 or Level 2 intermediate systems. Link-state PDUs contain information about the state of adjacencies to neighboring IS-IS systems.
What are three extended BGP communities? (Choose three.)
A. Origin: 172.16.100.100:100
B. domain-id: 192.168.1.1:555
The BGP extended communities attribute format has three fields:
type: administrator: assigned-number. type is the type of extended community and can be either the 16-bit numerical identifier of a specific BGP extended community or one of these types: origin– Identifies where the route originated.
domain-id– Identifies the OSPF domain from which the route originated.
target– Identifies the destination to which the route is going.
bandwidth– Sets up the bandwidth extended community. Specifying link bandwidth allows you to distribute traffic unequally among different BGP paths.
rt-import– Identifies the route to install in the routing table.
src -as– Identifies the AS from which the route originated.
You must specify an AS number, not an IP address.
Which two statements are true about DIS elections in IS-IS? (Choose two.)
A. If a priority tie occurs, the router with the lower subnetwork point of attachment (SNPA) value becomes the DIS.
B. If a priority tie occurs, the router with the higher subnetwork point of attachment (SNPA) value becomes the DIS.
C. The router with the lower priority value becomes the DIS.
D. The router with the higher priority value becomes the DIS.
In IS-IS, deterministic DIS election makes the possibility of predicting the router that will be elected as DIS from the same set of routers.
The router advertising the numerically highest priority wins, with numerically highest MAC address, also called a Subnetwork Point of Attachment (SNPA), breaking the tie.
Host-1 was recently added in the network and is attached to ge-0/0/10 on Switch-A.
Host-1 is powered on and has its interface configured with default Layer 2 settings and an IP address on the 172.17.12.0/24 IP subnet.
Host-1’s MAC address is not shown in Switch-A’s bridging table.
What are three explanations for this state? (Choose three.)
A. The ge-0/0/10 interface is configured as an access port.
B. The ge-0/0/10 interface is not operationally or administratively up.
C. The ge-0/0/10 interface does not have an associated IRB.
D. The ge-0/0/10 interface has not received any traffic from Host-1.
E. The ge-0/0/10 interface is configured as a trunk port.
B: MAC learning messages received with errors include:
Interface down–The MAC address is learned on an interface that is down.
C: To configure the MAC address of an IRB interface Etc.
Router-1 and Router-2 need to connect through the Internet using a tunneling technology.
Hosts that are connected to Router-1 and Router-2 will be sending traffic up to 1500 bytes.
The maximum segment size is supported across the path is 1520 bytes.
Which tunneling technology will allow this communication to take place?
A. GRE tunnel
B. IPsec VPN transport mode
C. IPsec VPN tunnel mode
D. IP-IP tunnel
Difference Between GRE and IP-IP Tunnel. Generic Routing Encapsulation (GRE) and IP-in-IP (IPIP) are two rather similar tunneling mechanisms which are often confused. In terms of less overhead, the GRE header is 24 bytes and an IP header is 20 bytes.
What are two interarea OSPF LSA types? (Choose two.)
A. Type-4 ASBR summary LSAs
B. Type 3 summary LSAs
C. Type 1 router LSAs
D. Type 2 network LSAs
A: The fourth LSA type, network example:
In this example we have R1 that is redistributing information from the RIP router into OSPF. This makes R1 an ASBR (Autonomous System Border Router). What happens is that R1 will flip a bit in the router LSA to identify itself as an ASBR. When R2 who is an ABR receives this router LSA it will create a type 4 summary ASBR LSA and flood it into area 0. This LSA will also be flooded in all other areas and is required so all OSPF routers know where to find the ASBR.
Router 2 can create a Type 3 summary LSA and flood it into area 0. This LSA will flood into all the other areas of our OSPF network. This way all the routers in other areas will know about the prefixes from other areas. Note: The name “summary” LSA is very misleading. By default OSPF is not going to summarize anything for you. There is however a command that let you summarize inter-area routes. Take a look at my OSPF summarization tutorial if you are interested. If you are looking at the routing table of an OSPF router and see some O IA entries you are looking at LSA type 3 summary LSAs. Those are your inter-area prefixes!
1.|2017 New Version JN0-346 Exam Dumps (PDF & VCE) 75Q&As Download:
2.|2017 New Version JN0-346 Study Guide Video: