Preview

Juniper Jncis Sp

Satisfactory Essays
Open Document
Open Document
7180 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Juniper Jncis Sp
Juniper JN0-360

Juniper Networks Certified Internet Specialist, – Service Provider (JNCIS-SP)

Practice Test
Version: 4.3

Juniper JN0-360: Practice Exam QUESTION NO: 1 What are two valid actions that can be applied to a frame by a Layer 2 firewall filter? (Choose two)

A. Log B. loss-priority C. sample D. count Answer: B,D Explanation: The correct answers are B, D. Reference: You can specify the following filter actions: * accept * count counter-name * discard * dscp code-point (family inet only) * forwarding-class class-name * ipsec-sa ipsec-sa (family inet only)

* load-balance group-name (family inet only)

* logical-system logical-system-name (family inet and inet6 only) * loss-priority (high | medium-high | medium-low | low) * next term * next-hop-group group-name (family inet only) * policer policer-name * port-mirror (family bridge, ccc, inet, inet6, and vpls only) * prefix-action action-name (family inet only) * reject (family inet and inet6 only)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

* log (family inet and inet6 only)

tua

lTe

sts

.co

m

2

Juniper JN0-360: Practice Exam * routing-instance routing-instance-name (family inet and inet6 only) * sample (family inet, inet6, and mpls only) * service-accounting (service filters and family inet or inet6 only) * service-filter-hit (service filters and family inet or inet6 only) * syslog (family inet and inet6 only) * three-color-policer policer-name

QUESTION NO: 2

Answer: A,D Explanation:

QUESTION NO: 3 You must configure an OSPF area that does not accept type 3 link-state advertisements (LSAs) from area 0 (other than the default route) You have configured your area to be stub, but you still see type 3 LSAs. What will account for this behavior?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. IPsec is built into IPv6 B. IPv6 uses a 32-bit (4-byte) address and can support up to 4,294,967,296 addresses C. IPv4 supports extension

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    2) What is the purpose of defining a Policy definition as a first step in performing a Nessus vulnerability scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    a) According the ASC 605­25­25­5 there are two criteria that must be met in order…

    • 1375 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    3.2: OSI reference model: The OSI model includes two more layers that the TCP/IP layer already had but is constructed in only layer 5.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 2640 Unit 4

    • 277 Words
    • 2 Pages

    The values between juniper and Cisco are very similar. The default values are a little slower with Juniper in some areas such as IS-IS and OSPF (intermediate system to immediate system and open shortest path first).…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    3. When referring to IPSec tunnel mode, what two types of headers are available and how do they differ?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    6. Since IPv6 is the long-term solution for this issue, why do you think we are still using and assigning IPv4 addresses on the Internet? So that we can use up all off the addresses available on IPv4, therefore having more addresses free on IPv6.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    memories for long term and yet some people forget things that has happen within a certain…

    • 824 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    4. How many different source IP host addresses did you capture in your protocol capture?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Formalities in Law

    • 5630 Words
    • 23 Pages

    4. Channelling function: Helps to identify particular types of transactions and to mark them as enforceable or unenforceable…

    • 5630 Words
    • 23 Pages
    Better Essays
  • Powerful Essays

    We define a slice topology during slice initialization. The slice topology indicates the involved switches, subnets/hosts, boarder router, firewall instances, load balancers, NAT routers, IDS/IPS etc. We use a physical view to represent where the involved service functions are physically located and how they are connected to S-Fabric. We use a logical view to define the logical paths of the service function chain. Figures 2 shows an example slice by comparing its physical view to its logical view as for SFCs. A, B1, B2, C are hosts in subnet A, subnet B and subnet C. Subnet C is connected via internet to BR over IPSec VPN.…

    • 1899 Words
    • 8 Pages
    Powerful Essays