|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|
[NEW-JN0-346-Dumps]100% Success-Braindump2go JN0-346 Dump PDF 75q Instant Download[1-8]
2017 Jan NEW Juniper Exam JN0-346 PDF and JN0-346 VCE Dumps Released!
What information is included in the DHCP snooping database? (Choose two.)
A. client MAC address
B. DHCP server address
C. DHCP options
When DHCP snooping is enabled, the lease information from the server is used to create the DHCP snooping table, also known as the binding table.
The table shows current IP-MAC bindings, as well as lease time, type of binding, names of associated VLANs, and associated interface.
Which three statements are correct about the voice VLAN feature? (Choose three.)
A. It allows the access port to accept tagged voice and untagged data packets.
B. It allows you to apply independent CoS actions to data and voice packets.
C. It can be used with LLDP-MED to dynamically assign the VLAN ID value to IP phones.
D. It allows trunk ports to accept tagged voice and untagged data packets.
E. It must use the same VLAN ID as data traffic on a defined interface.
A (not D): The Voice VLAN feature in EX-series switches enables access ports to accept both data (untagged) and voice (tagged) traffic and separate that traffic into different VLANs.
B: To assign differentiated priority to Voice traffic, it is recommended that class of service (CoS) is configured prior to enabling the voice VLAN feature. Typically, voice traffic is treated with a higher priority than common user traffic. Without differentiated treatment through CoS, all traffic, regardless of the type, is subject to the same delay during times of congestion.
C: In conjunction with Voice VLAN, you can utilize Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) to provide the voice VLAN ID and 802.1p values to the attached IP phones. This dynamic method associates each IP phone with the appropriate voice VLAN and assigns the necessary802.1p values, which are used by CoS, to differentiate service for voice traffic within a network.
Which two statements are correct about aggregate routes in the Junos OS? (Choose two.)
A. An active route can contribute only to a single aggregate route.
B. Only one aggregate route can be configured for each destination prefix.
C. An aggregate route has a default next hop of an IP address.
D. An aggregate route always shows as active in the routing table.
A route can contribute only to a single aggregate route.
You can configure only one aggregate route for each destination prefix.
Which device is used to separate collision domains?
Modern wired networks use a network switch to reduce or eliminate collisions.
By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.
What are two types of IS-IS PDUs? (Choose two.)
A. open PDU
B. VRF PDU
C. hello PDU
D. link-state PDU
IS-IS hello (IIH) PDUs broadcast to discover the identity of neighboring IS-IS systems and to determine whether the neighbors are Level 1 or Level 2 intermediate systems. Link-state PDUs contain information about the state of adjacencies to neighboring IS-IS systems.
What are three extended BGP communities? (Choose three.)
A. Origin: 172.16.100.100:100
B. domain-id: 192.168.1.1:555
The BGP extended communities attribute format has three fields:
type: administrator: assigned-number. type is the type of extended community and can be either the 16-bit numerical identifier of a specific BGP extended community or one of these types: origin– Identifies where the route originated.
domain-id– Identifies the OSPF domain from which the route originated.
target– Identifies the destination to which the route is going.
bandwidth– Sets up the bandwidth extended community. Specifying link bandwidth allows you to distribute traffic unequally among different BGP paths.
rt-import– Identifies the route to install in the routing table.
src -as– Identifies the AS from which the route originated.
You must specify an AS number, not an IP address.
Which two statements are true about DIS elections in IS-IS? (Choose two.)
A. If a priority tie occurs, the router with the lower subnetwork point of attachment (SNPA) value becomes the DIS.
B. If a priority tie occurs, the router with the higher subnetwork point of attachment (SNPA) value becomes the DIS.
C. The router with the lower priority value becomes the DIS.
D. The router with the higher priority value becomes the DIS.
In IS-IS, deterministic DIS election makes the possibility of predicting the router that will be elected as DIS from the same set of routers.
The router advertising the numerically highest priority wins, with numerically highest MAC address, also called a Subnetwork Point of Attachment (SNPA), breaking the tie.
Host-1 was recently added in the network and is attached to ge-0/0/10 on Switch-A.
Host-1 is powered on and has its interface configured with default Layer 2 settings and an IP address on the 172.17.12.0/24 IP subnet.
Host-1’s MAC address is not shown in Switch-A’s bridging table.
What are three explanations for this state? (Choose three.)
A. The ge-0/0/10 interface is configured as an access port.
B. The ge-0/0/10 interface is not operationally or administratively up.
C. The ge-0/0/10 interface does not have an associated IRB.
D. The ge-0/0/10 interface has not received any traffic from Host-1.
E. The ge-0/0/10 interface is configured as a trunk port.
B: MAC learning messages received with errors include:
Interface down–The MAC address is learned on an interface that is down.
C: To configure the MAC address of an IRB interface Etc.