[Free] 2018(Mar) Dumps4cert Testinsides Juniper JN0-343 Dumps with VCE and PDF 251-260

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Mar Juniper Official New Released JN0-343
100% Free Download! 100% Pass Guaranteed!

Juniper Networks Certified Internet Specialist (JNCIS-ENT)

Question No: 251 – (Topic 3)

Which three steps must you complete for an aggregated Ethernet configuration on a switch? (Choose three.)

  1. Define the aggregated Ethernet interface under the [edit chassis] stanza.

  2. Configure the interface under the [edit protocols lacp] stanza.

  3. Configure the aggregated Ethernet interface.

  4. Assign physical interfaces to the aggregated Ethernet interface.

  5. Configure the minimum number of links required for the bundle to be operational.

Answer: A,C,D

Question No: 252 – (Topic 3)

Under which hierarchy do you configure OSPF?

  1. [edit protocols ospf]

  2. [edit routing-options]

  3. [edit routing-protocols]

  4. [edit protocols igp]

Answer: A

Explanation: 1C.JPR.Parma-VC.001.A1gt; show configuration protocols ospf inactivE. traceoptions {

file ospf.txt; flag state; flag route; flag general;

flag event detail;


traffic-engineering; export ospf-redistribution; area {

interface ae0.0 { interface-type p2p; hello-interval 3; authentication {

md5 1 key OMMITTED



interface lo0.0 { passive;



Question No: 253 – (Topic 3)

Why does a router create an ASBRSum (Type 4) LSA?

  1. An ABR creates an ASBRSum (Type 4) LSA with the information contained in NSSA (Type 7) LSAs it receives from NSSAs.

  2. An ABR creates an ASBRSum (Type 4) LSA to describe the router ID of ASBRs located in other areas.

  3. An ASBR creates an ASBRSum (Type 4) LSA to describe its router ID so that routers in other areas can reach the external networks it advertises.

  4. An ABR creates an ASBRSum (Type 4) LSA to summarize routes received from other areas.

Answer: B

Question No: 254 – (Topic 3)

Dumps4Cert 2018 PDF and VCE

Five routers (R1, R2, R3, R4, and R5) are attached to a single Ethernet LAN and configured with addresses in the same subnet. R1 is chosen as the designated router (DR) and R2 is chosen as the backup designated router (BDR). You add R6 and configure it as shown in the exhibit. Which routers are now the DR and BDR?

  1. DR:R1 BDR: R2

  2. DR: R6 BDR: R1

  3. DR: R6 BDR: R2

  4. DR: R1 BDR: R6

Answer: A

Question No: 255 – (Topic 3)

Which command shows the state of OSPF adjacencies?

  1. show protocol ospf

  2. show interfaces ospf neighbor

  3. show ospf neighbor

  4. show port ospf neighbor

Answer: C

Question No: 256 – (Topic 3)

Which two statements are correct about the voice VLAN feature? (Choose two.)

  1. The voice VLAN feature enables access ports to accept both tagged and untagged traffic.

  2. The voice VLAN feature requires access ports to accept untagged traffic only.

  3. The voice VLAN feature always uses the same VLAN as the data VLAN

  4. The voice VLAN feature is used with CoS to differentiate traffic.

Answer: A,D

Question No: 257 – (Topic 3)

You are using redundant trunk groups (RTG) on your network.

Which two statements accurately describe RTG? (Choose two.)

  1. RTG interfaces pass BPDU packets.

  2. Aggregate Ethernet (AE) interfaces cannot be part of an RTG.

  3. RTG is used as an alternative to STP/RSTP.

  4. RTG connects an access switch to two aggregation switches.

Answer: C,D

Question No: 258 – (Topic 3)

What is the purpose of MAC limiting?

  1. MAC limiting limits the size of the CAM table and accelerates the aging of MAC addresses.

  2. MAC limiting sets a maximum rate on addresses learned over a period of time to minimize possible congestion caused by flooding.

  3. MAC limiting limits the number of source MAC addresses that may be learned on an interface and protects it from MAC spoofing.

  4. MAC limiting on a Layer 3 interface prevents a duplicate MAC address for a single IP address.

Answer: C

Question No: 259 – (Topic 3)

Which field of the IP header is modified on a payload packet when using GRE?

  1. time to live

  2. source address

  3. protocol

  4. fragment offset

Answer: A

Question No: 260 – (Topic 3)

You have enabled VRRP. You want to prevent preemptive behavior. Which two actions must you perform? (Choose two.)

  1. Use an IP address that is not assigned to a router interface.

  2. Use the IP address of one of the routers as the virtual address.

  3. Disable preemption with the no-preempt command.

  4. Set both routers to the same priority value.

Answer: A,C

100% Dumps4cert Free Download!
Download Free Demo:JN0-343 Demo PDF
100% Dumps4cert Free Guaranteed!
JN0-343 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.