Download Juniper Networks Certified Internet Specialist SP (JNCIS-SP).JN0-360.CertDumps.2018-07-24.410q.vcex

Vendor: Juniper
Exam Code: JN0-360
Exam Name: Juniper Networks Certified Internet Specialist SP (JNCIS-SP)
Date: Jul 24, 2018
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which two statements are true about virtual switches? (Choose two.)
  1. Multiple virtual switches share a single MAC table.
  2. Virtual switches contain separate MAC tables.
  3. By default, the direct route associated with a virtual switch's IRB interface is placed in inet.0.
  4. By default, the direct route associated with a virtual switch's IRB interface is placed in the associated virtual switch's routing table.
Correct answer: BC
Explanation:
In a Virtual Chassis, multiple switches—each with its own set of interfaces with unique MAC addresses—are connected together to form one chassis that can be managed as a single switch. The MAC address assigned to each network-facing interface on the switch changes when the switch joins a Virtual Chassis. Because all Layer 2 traffic decisions are based on an interface’s MAC address, understanding MAC address assignment is important to understanding how network traffic is forwarded and received by the Virtual Chassis. For additional information about how a network uses MAC addresses to forward and receive traffic, see Understanding Bridging and VLANs on EX Series Switches. http://www.juniper.net/documentation/en_US/junos15.1/topics/concept/virtual-chassis-mac-address-assignment.html
In a Virtual Chassis, multiple switches—each with its own set of interfaces with unique MAC addresses—are connected together to form one chassis that can be managed as a single switch. The MAC address assigned to each network-facing interface on the switch changes when the switch joins a Virtual Chassis. Because all Layer 2 traffic decisions are based on an interface’s MAC address, understanding MAC address assignment is important to understanding how network traffic is forwarded and received by the Virtual Chassis. For additional information about how a network uses MAC addresses to forward and receive traffic, see Understanding Bridging and VLANs on EX Series Switches. 
http://www.juniper.net/documentation/en_US/junos15.1/topics/concept/virtual-chassis-mac-address-assignment.html
Question 2
In Q-in-Q tunneling, what is the purpose of the pop-swap operation?
  1. pop the outer tag and swap the inner tag
  2. pop and swap the inner tag
  3. pop and swap both outer and inner tags
  4. pop the inner tag and swap the outer tag
Correct answer: A
Explanation:
The transit route POP's the outer label and swaps the inner label
The transit route POP's the outer label and swaps the inner label
Question 3
What are three components of the tag portion of an 802.1Q-tagged Ethernet frame? (Choose three.)
  1. Tag Protocol Identifier
  2. maximum transmission unit
  3. canonical format indicator
  4. unique VLAN identifier
  5. frame check sequence
Correct answer: ACD
Explanation:
The VLAN tag was invented to distinguish among different VLAN broadcast domains on a group of LAN switches. The VLAN tag is a two-byte field inserted between the source MAC address and the Ethertype (or length) field in an Ethernet frame. Another two-byte field, the Tag Protocol Identifier (TPI or TPID), precedes the VLAN tag field.  The Canonical Format Indicator (CFI) bit indicates whether the following 12 bits of VLAN identifier conform to Ethernet or not. For Ethernet frames, this bit is always set to 0. (The other possible value, CFI=1, is used for Token Ring LANs, and tagged frames should never be bridged between an Ethernet and Token Ring LAN regardless of the VLAN tag or MAC address.) http://www.juniper.net/documentation/en_US/junos15.1/topics/concept/layer-2-networking-ethernet-frame-forwarding-802-1q-vlan-tag-mx-solutions.html
The VLAN tag was invented to distinguish among different VLAN broadcast domains on a group of LAN switches. The VLAN tag is a two-byte field inserted between the source MAC address and the Ethertype (or length) field in an Ethernet frame. Another two-byte field, the Tag Protocol Identifier (TPI or TPID), precedes the VLAN tag field.  
The Canonical Format Indicator (CFI) bit indicates whether the following 12 bits of VLAN identifier conform to Ethernet or not. For Ethernet frames, this bit is always set to 0. (The other possible value, CFI=1, is used for Token Ring LANs, and tagged frames should never be bridged between an Ethernet and Token Ring LAN regardless of the VLAN tag or MAC address.) 
http://www.juniper.net/documentation/en_US/junos15.1/topics/concept/layer-2-networking-ethernet-frame-forwarding-802-1q-vlan-tag-mx-solutions.html
Question 4
Which three mechanisms are used by switches to build and maintain bridge tables? (Choose three.)
  1. learning
  2. rewriting
  3. flooding
  4. aging
  5. blocking
Correct answer: ACD
Explanation:
Learning:A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network. Flooding:As part of the learning process, a switch will flood the single frame out all of its other ports when it cannot find the destination MAC address in the switch’s lookup table. Aging:Whenever switch updates an entry in the MAC address table, the switch resets the timer for that entry. Timers are used in aging process of old entries. Aging helps to remove old entries and free memory of MAC address table to add new entries.
Learning:
A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network. 
Flooding:
As part of the learning process, a switch will flood the single frame out all of its other ports when it cannot find the destination MAC address in the switch’s lookup table. 
Aging:
Whenever switch updates an entry in the MAC address table, the switch resets the timer for that entry. Timers are used in aging process of old entries. Aging helps to remove old entries and free memory of MAC address table to add new entries.
Question 5
What is the purpose of a trunk link?
  1. to carry traffic for multiple VLANs between multiple switches
  2. to interconnect multiple bridging domains on the same switch
  3. to aggregate multiple native VLANs into a single bridging domain
  4. to allow Layer 3 functionality for multiple VLANs
Correct answer: A
Explanation:
A trunk is a line or link designed to handle many VLANs simultaneously, and that connects major switching centers or nodes in a communications system.
A trunk is a line or link designed to handle many VLANs simultaneously, and that connects major switching centers or nodes in a communications system.
Question 6
What are two differences between RSTP and VSTP? (Choose two.)
  1. Using VSTP, the BPDU destination address is always 01:00:0C:CC:CC:CD.
  2. Using VSTP, the BPDU frame carries an 802.1Q tag.
  3. Using RSTP, the BPDU destination address is always 01:00:0C:CC:CC:CD.
  4. Using RSTP, the BPDU frame carries an 802.1Q tag.
Correct answer: AB
Explanation:
VSTP on Juniper Networks routers has some interoperability with other proprietary per-VLAN vendor solutions; specifically, VSTP can interoperate with per-VLAN spanning tree (PVST) and Rapid-PVST on IEEE 802.1Q non-proprietary trunks. In PVST, the IEEE 802.1Q BPDUs are sent untagged on the common spanning-tree VLAN 1 for interoperability with other vendors. The CST BPDUs are sent to the IEEE standard bridge group: MAC Address 01-80-c2-00-00-00, DSAP 42, SSAP 42.PVST BPDUs are tagged and sent to MAC address 01-00-0c-cc-cc-cd (SNAP HDLC protocol type 0x010b) for each VLAN on a trunk. PVST per-VLAN BPDUs are tunneled by pure IEEE 802.1Q bridges.
VSTP on Juniper Networks routers has some interoperability with other proprietary per-VLAN vendor solutions; specifically, VSTP can interoperate with per-VLAN spanning tree (PVST) and Rapid-PVST on IEEE 802.1Q non-proprietary trunks. 
In PVST, the IEEE 802.1Q BPDUs are sent untagged on the common spanning-tree VLAN 1 for interoperability with other vendors. The CST BPDUs are sent to the IEEE standard bridge group: MAC Address 01-80-c2-00-00-00, DSAP 42, SSAP 42.
PVST BPDUs are tagged and sent to MAC address 01-00-0c-cc-cc-cd (SNAP HDLC protocol type 0x010b) for each VLAN on a trunk. PVST per-VLAN BPDUs are tunneled by pure IEEE 802.1Q bridges.
Question 7
A rogue switch has been added to your network, exchanged BPDUs, and is now part of the spanning tree topology. 
Which feature would help prevent this from happening in the future?
  1. storm control
  2. BPDU control
  3. root protection
  4. loop protection
Correct answer: B
Explanation:
EX Series switches support spanning-tree protocols that prevent loops in a network by creating a tree topology (spanning-tree) of the entire bridged network. All spanning-tree protocols use a special type of frame called bridge protocol data units (BPDUs) to communicate with each other.  When BPDUs generated by other devices are transmitted to switches on which spanning-tree protocols are configured, a misconfiguration can occur in the spanning tree and a network outage can occur. Therefore, it is necessary to protect an interface in a spanning-tree topology from BPDUs generated from other devices. http://www.juniper.net/documentation/en_US/junos13.3/topics/task/configuration/spanning-trees-bpdu-block-cli.html
EX Series switches support spanning-tree protocols that prevent loops in a network by creating a tree topology (spanning-tree) of the entire bridged network. All spanning-tree protocols use a special type of frame called bridge protocol data units (BPDUs) to communicate with each other.  
When BPDUs generated by other devices are transmitted to switches on which spanning-tree protocols are configured, a misconfiguration can occur in the spanning tree and a network outage can occur. Therefore, it is necessary to protect an interface in a spanning-tree topology from BPDUs generated from other devices. 
http://www.juniper.net/documentation/en_US/junos13.3/topics/task/configuration/spanning-trees-bpdu-block-cli.html
Question 8
What is the maximum number of MSTIs supported in an MST region?
  1. 32
  2. 64
  3. 128
  4. 256
Correct answer: B
Explanation:
Multiple Spanning Tree Protocol (MSTP) was first specified in IEEE 802.1s and is standardized in IEEE 802.1Q. MSTP enables multiple VLANs to be mapped to the same spanning-tree instance, reducing the number of spanning-tree instances needed to support a large number of VLANs. MSTP provides multiple forwarding paths for data traffic and enables load balancing. It improves the fault tolerance of the network because a failure in one instance, or forwarding path, does not affect other instances. MSTP has a backward compatibility mode in which it can fall back to STP or RSTP operation on links with bridges that support only STP or RSTP. The maximum number of MSTP instances supported in Juniper Networks MX Series 3D Universal Edge Routers is 64. https://www.juniper.net/documentation/en_US/junos12.3/topics/concept/mx-series-multiple-stp.html
Multiple Spanning Tree Protocol (MSTP) was first specified in IEEE 802.1s and is standardized in IEEE 802.1Q. MSTP enables multiple VLANs to be mapped to the same spanning-tree instance, reducing the number of spanning-tree instances needed to support a large number of VLANs. MSTP provides multiple forwarding paths for data traffic and enables load balancing. It improves the fault tolerance of the network because a failure in one instance, or forwarding path, does not affect other instances. 
MSTP has a backward compatibility mode in which it can fall back to STP or RSTP operation on links with bridges that support only STP or RSTP. 
The maximum number of MSTP instances supported in Juniper Networks MX Series 3D Universal Edge Routers is 64. 
https://www.juniper.net/documentation/en_US/junos12.3/topics/concept/mx-series-multiple-stp.html
Question 9
Which two statements are true about STP and RSTP? (Choose two.)
  1. STP uses a proposal-and-agreement handshake on point-to-point links instead of timers.
  2. In RSTP, root ports and edge ports transition to the forwarding state immediately, without exchanging messages with other switches.
  3. In RSTP, a TCN is generated when a port transitions to the discarding state.
  4. In STP, the forwarding delay timer and maximum age timer define the convergence delay.
Correct answer: BD
Explanation:
Rapid Spanning Tree Protocol (RSTP–802.1w/802.1d 2004): Similar to legacy STP, RSTP implements a single instance of Spanning Tree but dramatically improves the convergence time  For example, in legacy STP, a host port coming online can take up to 30 seconds (2 x FWD_Delay) before it begins forwarding . Direct or indirect node/link failure convergence can even take up to 50 seconds (MAX_Age + 2 x FWD_Delay) with legacy STP. Such convergence times are not acceptable in today’s high-performance enterprise networks RSTP overcomes slow convergence times by introducing new port roles (edge port, alternate port and backup port) and new convergence behavior under specific connectivity conditions (for example, point-to-point or shared medium) . These enhancements enable RSTP to achieve sub-second forwarding and network convergence RSTP is backward-compatible with legacy STP; if legacy STP BPDU is detected on a link, then an RSTP-capable bridge will revert to legacy STP on that given port . Understanding RSTP for EX Series Switches http://www.juniper.net/documentation/en_US/junos13.2/topics/concept/spanning-trees-ex-series-rstp-understanding.html
Rapid Spanning Tree Protocol (RSTP–802.1w/802.1d 2004): 
Similar to legacy STP, RSTP implements a single instance of Spanning Tree but dramatically improves the convergence time  
For example, in legacy STP, a host port coming online can take up to 30 seconds (2 x FWD_Delay) before it begins forwarding . Direct or indirect node/link failure convergence can even take up to 50 seconds (MAX_Age + 2 x FWD_Delay) with legacy STP. Such convergence times are not acceptable in today’s high-performance enterprise networks 
RSTP overcomes slow convergence times by introducing new port roles (edge port, alternate port and backup port) and new convergence behavior under specific connectivity conditions (for example, point-to-point or shared medium) . These enhancements enable RSTP to achieve sub-second forwarding and network convergence 
RSTP is backward-compatible with legacy STP; if legacy STP BPDU is detected on a link, then an RSTP-capable bridge will revert to legacy STP on that given port . 
Understanding RSTP for EX Series Switches 
http://www.juniper.net/documentation/en_US/junos13.2/topics/concept/spanning-trees-ex-series-rstp-understanding.html
Question 10
What are two types of BPDUs in the Spanning Tree Protocol? (Choose two.)
  1. configuration
  2. hello
  3. topology change notification
  4. link state
Correct answer: AC
Explanation:
Bridge Protocol Data Units (BPDUs) are frames that contain information about the Spanning tree protocol (STP). Switches send BPDUs using a unique MAC address from its origin port and a multicast address as destination MAC (01:80:C2:00:00:00, or 01:00:0C:CC:CC:CD for Per VLAN Spanning Tree). For STP algorithms to function, the switches need to share information about themselves and their connections. What they share are bridge protocol data units (BPDUs). BPDUs are sent out as multicast frames to which only other layer 2 switches or bridges are listening.There are three kinds of BPDUs:    Configuration BPDU, used by Spanning tree protocol to provide information to all switches.     TCN (Topology Change Notification), tell about changes in the topology.     TCA (Topology Change Acknowledgment), confirm the reception of the TCN. https://en.wikipedia.org/wiki/Bridge_Protocol_Data_Unit
Bridge Protocol Data Units (BPDUs) are frames that contain information about the Spanning tree protocol (STP). Switches send BPDUs using a unique MAC address from its origin port and a multicast address as destination MAC (01:80:C2:00:00:00, or 01:00:0C:CC:CC:CD for Per VLAN Spanning Tree). For STP algorithms to function, the switches need to share information about themselves and their connections. What they share are bridge protocol data units (BPDUs). BPDUs are sent out as multicast frames to which only other layer 2 switches or bridges are listening.
There are three kinds of BPDUs:
    Configuration BPDU, used by Spanning tree protocol to provide information to all switches. 
    TCN (Topology Change Notification), tell about changes in the topology. 
    TCA (Topology Change Acknowledgment), confirm the reception of the TCN. 
https://en.wikipedia.org/wiki/Bridge_Protocol_Data_Unit
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!