Enterprise Routing and Switching, Specialist (JNCIS-ENT) v1.0

Page:    1 / 7   
Exam contains 95 questions

Which two statements about Layer 2 loop prevention protocols are correct? (Choose two.)

  • A. With STP, a designated port can transition to the forwarding state without waiting for the protocol times to expire.
  • B. STP uses point-to-point and edge port designations.
  • C. With RSTP, a designated port can transition to the forwarding state without waiting for the protocol times to expire.
  • D. RSTP uses point-to-point and edge port designations.


Answer : CD

Which protocol supports tunneling of non-IP traffic?

  • A. GRE
  • B. SSH
  • C. IPsec
  • D. IP-IP


Answer : D

Click the Exhibit button.

You are attempting to set up IS-IS on a device that has two interfaces (ge-0/0/1.0 and ge-0/0/2.0) in Level 1 and one interface (ge-0/0/0.0) in Level 2; however, it does not participate in either level.
Referring to the exhibit, what is the problem?

  • A. The ge-0/0/0.0 interface must have the Level 1 disable statement removed.
  • B. The lo0 interface must participate in both levels.
    С. One of the interfaces requires a network entity title on it.
  • D. All of the interfaces must have the level disable statement removed.


Answer : C

Click the Exhibit button.

Referring to the exhibit, which router will be selected as the DR?

  • A. R1
  • B. R5
  • C. R4
  • D. R3


Answer : D

Click the Exhibit button.

Referring to the exhibit, which three statements are correct? (Choose three.)

  • A. R1 and R3 can form a Layer 2 IS-IS adjacency.
  • B. R2 and R4 can form a Layer 1 IS-IS adjacency.
  • C. R3 and R4 can form a Layer 2 IS-IS adjacency.
  • D. R1 and R3 can form a Layer 1 IS-IS adjacency.
  • E. R3 and R4 can form a Layer 1 IS-IS adjacency.


Answer : ACD

You are asked to configure filter-based forwarding (FBF) to forward traffic sourced from a specific subnet to a webserver.
In this scenario, which mechanism is used to add interface routes to the forwarding routing instance used in FBF?

  • A. generated routes
  • B. RIB groups
  • C. forwarding policy
  • D. routing policy


Answer : B

Click the Exhibit button.

Referring to the exhibit, which port will be selected as the RSTP root port on Switch-4?

  • A. ge-0/0/13.0
  • B. ge-0/0/8.0
  • C. ge-0/0/9.0
  • D. ge-0/0/12.0


Answer : D

Which two statements about a Virtual Chassis are correct? (Choose two.)

  • A. A Virtual Chassis is managed using a single virtual console port.
  • B. You must use the same EX Series switch for all members in a Virtual Chassis.
  • C. All members in a Virtual Chassis must be running the same Junos version.
  • D. Each device must be managed separately.


Answer : AC

Click the Exhibit button.

Referring to the exhibit, which type of route is displayed?

  • A. martian
  • B. static
  • C. generate
  • D. aggregate


Answer : C

Which statement describes BFD?

  • A. BFD rapidly detects link failures.
  • B. BFD provides route loop protection.
  • C. BFD provides broadcast storm protection.
  • D. BFD provides high availability with multiple Routing Engines.


Answer : A

What is a purpose for the OSPF database description packet?

  • A. to transfer the LSA headers between two systems
  • B. to determine who is in charge of database flushing
  • C. to transfer the LSUs between two systems
  • D. to determine who is in charge of adjacency formation


Answer : A

You must limit access to a printer with a persistent DHCP address of 2001:db8:0000:50::10/64 in VLAN v50 to users assigned to VLAN v50 only.
Which action would satisfy this requirement?

  • A. Implement persistent MAC learning to ensure that 2001:db8:0000:50::10 is allocated properly.
  • B. Implement a firewall filter on the IRB interface for VLAN v50, blocking traffic to/from 2001:db8:0000:50::10.
  • C. Implement a firewall filter on the VLAN v50, blocking traffic to/from 2001:db8:0000:50::10.
  • D. Implement DHCP snooping on VLAN v50 to ensure that 2001:db8:0000:50::10 is allocated properly.


Answer : B

Which two statements about the root bridge election process are correct? (Choose two.)

  • A. The highest root bridge priority is preferred over lower root bridge priorities.
  • B. The highest root bridge identifier is preferred over lower root bridge identifiers.
  • C. The lowest root bridge priority is preferred over higher root bridge priorities.
  • D. The lowest root bridge identifier is preferred over higher root bridge identifiers.


Answer : BC

Which two port security mechanisms rely on an accurate DHCP snooping database to operate correctly? (Choose two.)

  • A. IP source guard
  • B. persistent MAC learning
  • C. MACsec
  • D. dynamic ARP inspection


Answer : AD

Click the Exhibit Button.

Referring to the exhibit, which two statements about the BGP connection are correct? (Choose two.)

  • A. The local device has AS 100 configured but the peer is expecting AS 101.
  • B. This is an EBGP peering session.
  • C. This is an IBGP peering session.
  • D. The local device has AS 101 configured but the peer is expecting AS 100.


Answer : BD

Page:    1 / 7   
Exam contains 95 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy