Download Juniper Enterprise Routing and Switching, Specialist.JN0-351.CertDumps.2023-10-20.36q.tqb

Vendor: Juniper
Exam Code: JN0-351
Exam Name: Juniper Enterprise Routing and Switching, Specialist
Date: Oct 20, 2023
File Size: 15 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
What is the default keepalive time for BGP?
  1. 10 seconds
  2. 60 seconds
  3. 30 seconds
  4. 90 seconds
Correct answer: B
Explanation:
The default keepalive time for BGP is60 seconds1.The keepalive time is the interval at which BGP sends keepalive messages to maintain the connection with its peer1.If the keepalive message is not received within the hold time, the connection is considered lost1.By default, the hold time is three times the keepalive time, which is180 seconds1.
The default keepalive time for BGP is60 seconds1.The keepalive time is the interval at which BGP sends keepalive messages to maintain the connection with its peer1.If the keepalive message is not received within the hold time, the connection is considered lost1.By default, the hold time is three times the keepalive time, which is180 seconds1.
Question 2
Which two statements are correct about tunnels? (Choose two.)
  1. BFD cannot be used to monitor tunnels.
  2. Tunnel endpoints must have a valid route to the remote tunnel endpoint.
  3. IP-IP tunnels are stateful.
  4. Tunnels add additional overhead to packet size.
Correct answer: BD
Explanation:
A tunnel is a connection between two computer networks, in which data is sent from one network to another through an encrypted link. Tunnels are commonly used to secure data communications between two networks or to connect two networks that use different protocols.Option B is correct, because tunnel endpoints must have a valid route to the remote tunnel endpoint. A tunnel endpoint is the device that initiates or terminates a tunnel connection. For a tunnel to be established, both endpoints must be able to reach each other over the underlying network.This means that they must have a valid route to the IP address of the remote endpoint1.Option D is correct, because tunnels add additional overhead to packet size. Tunnels work by encapsulating packets: wrapping packets inside of other packets. This means that the original packet becomes the payload of the surrounding packet, and the surrounding packet has its own header and trailer. The header and trailer of the surrounding packet add extra bytes to the packet size, which is called overhead. Overhead can reduce the efficiency and performance of a network, as it consumes more bandwidth and processing power2.Option A is incorrect, because BFD can be used to monitor tunnels. BFD is a protocol that can be used to quickly detect failures in the forwarding path between two adjacent routers or switches. BFD can be integrated with various routing protocols and link aggregation protocols to provide faster convergence and fault recovery. BFD can also be used to monitor the connectivity of tunnels, such as GRE, IPsec, or MPLS.Option C is incorrect, because IP-IP tunnels are stateless. IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features. IP-IP tunnels are stateless, which means that they do not keep track of the state or status of the tunnel connection. Stateless tunnels do not require any signaling or negotiation between the endpoints, but they also do not provide any error detection or recovery mechanisms.1:What is Tunneling? | Tunneling in Networking2:What Is Tunnel In Networking, Its Types, And Its Benefits?: [Configuring Bidirectional Forwarding Detection] : [IP-IP Tunneling]
A tunnel is a connection between two computer networks, in which data is sent from one network to another through an encrypted link. Tunnels are commonly used to secure data communications between two networks or to connect two networks that use different protocols.
Option B is correct, because tunnel endpoints must have a valid route to the remote tunnel endpoint. A tunnel endpoint is the device that initiates or terminates a tunnel connection. For a tunnel to be established, both endpoints must be able to reach each other over the underlying network.This means that they must have a valid route to the IP address of the remote endpoint1.
Option D is correct, because tunnels add additional overhead to packet size. Tunnels work by encapsulating packets: wrapping packets inside of other packets. This means that the original packet becomes the payload of the surrounding packet, and the surrounding packet has its own header and trailer. The header and trailer of the surrounding packet add extra bytes to the packet size, which is called overhead. Overhead can reduce the efficiency and performance of a network, as it consumes more bandwidth and processing power2.
Option A is incorrect, because BFD can be used to monitor tunnels. BFD is a protocol that can be used to quickly detect failures in the forwarding path between two adjacent routers or switches. BFD can be integrated with various routing protocols and link aggregation protocols to provide faster convergence and fault recovery. BFD can also be used to monitor the connectivity of tunnels, such as GRE, IPsec, or MPLS.
Option C is incorrect, because IP-IP tunnels are stateless. IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features. IP-IP tunnels are stateless, which means that they do not keep track of the state or status of the tunnel connection. Stateless tunnels do not require any signaling or negotiation between the endpoints, but they also do not provide any error detection or recovery mechanisms.
1:What is Tunneling? | Tunneling in Networking2:What Is Tunnel In Networking, Its Types, And Its Benefits?: [Configuring Bidirectional Forwarding Detection] : [IP-IP Tunneling]
Question 3
Which statement is correct about IP-IP tunnels?
  1. IP-IP tunnels only support encapsulating IP traffic.
  2. IP-IP tunnels only support encapsulating non-IP traffic.
  3. The TTL in the inner packet is decremented during transit to the tunnel endpoint.
  4. There are 24 bytes of overhead with IP-IP encapsulation.
Correct answer: A
Explanation:
IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features.IP-IP tunnels only support encapsulating IP traffic, which means that the payload of the inner packet must be an IP packet.IP-IP tunnels cannot encapsulate non-IP traffic, such as Ethernet frames or MPLS labels1.Option A is correct, because IP-IP tunnels only support encapsulating IP traffic. Option B is incorrect, because IP-IP tunnels only support encapsulating non-IP traffic. Option C is incorrect, because the TTL in the inner packet is not decremented during transit to the tunnel endpoint.The TTL in the outer packet is decremented by each router along the path, but the TTL in the inner packet is preserved until it reaches the tunnel endpoint2. Option D is incorrect, because there are 20 bytes of overhead with IP-IP encapsulation.The overhead consists of the header of the outer packet, which has a fixed size of 20 bytes for IPv43.1:IP-IP Tunneling2:What is tunneling? | Tunneling in networking3: IPv4 - Header
IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features.
IP-IP tunnels only support encapsulating IP traffic, which means that the payload of the inner packet must be an IP packet.IP-IP tunnels cannot encapsulate non-IP traffic, such as Ethernet frames or MPLS labels1.
Option A is correct, because IP-IP tunnels only support encapsulating IP traffic. Option B is incorrect, because IP-IP tunnels only support encapsulating non-IP traffic. Option C is incorrect, because the TTL in the inner packet is not decremented during transit to the tunnel endpoint.The TTL in the outer packet is decremented by each router along the path, but the TTL in the inner packet is preserved until it reaches the tunnel endpoint2. Option D is incorrect, because there are 20 bytes of overhead with IP-IP encapsulation.The overhead consists of the header of the outer packet, which has a fixed size of 20 bytes for IPv43.
1:IP-IP Tunneling2:What is tunneling? | Tunneling in networking3: IPv4 - Header
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!