Download Juniper.JN0-351.CertDumps.2023-10-20.36q.tqb

Download Exam

File Info

Exam Juniper Enterprise Routing and Switching, Specialist
Number JN0-351
File Name Juniper.JN0-351.CertDumps.2023-10-20.36q.tqb
Size 15 MB
Posted Oct 20, 2023
Download Juniper.JN0-351.CertDumps.2023-10-20.36q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the default keepalive time for BGP?


  1. 10 seconds
  2. 60 seconds
  3. 30 seconds
  4. 90 seconds
Correct answer: B
Explanation:
The default keepalive time for BGP is60 seconds1.The keepalive time is the interval at which BGP sends keepalive messages to maintain the connection with its peer1.If the keepalive message is not received within the hold time, the connection is considered lost1.By default, the hold time is three times the keepalive time, which is180 seconds1.
The default keepalive time for BGP is60 seconds1.The keepalive time is the interval at which BGP sends keepalive messages to maintain the connection with its peer1.If the keepalive message is not received within the hold time, the connection is considered lost1.By default, the hold time is three times the keepalive time, which is180 seconds1.



Question 2

Which two statements are correct about tunnels? (Choose two.)


  1. BFD cannot be used to monitor tunnels.
  2. Tunnel endpoints must have a valid route to the remote tunnel endpoint.
  3. IP-IP tunnels are stateful.
  4. Tunnels add additional overhead to packet size.
Correct answer: BD
Explanation:
A tunnel is a connection between two computer networks, in which data is sent from one network to another through an encrypted link. Tunnels are commonly used to secure data communications between two networks or to connect two networks that use different protocols.Option B is correct, because tunnel endpoints must have a valid route to the remote tunnel endpoint. A tunnel endpoint is the device that initiates or terminates a tunnel connection. For a tunnel to be established, both endpoints must be able to reach each other over the underlying network.This means that they must have a valid route to the IP address of the remote endpoint1.Option D is correct, because tunnels add additional overhead to packet size. Tunnels work by encapsulating packets: wrapping packets inside of other packets. This means that the original packet becomes the payload of the surrounding packet, and the surrounding packet has its own header and trailer. The header and trailer of the surrounding packet add extra bytes to the packet size, which is called overhead. Overhead can reduce the efficiency and performance of a network, as it consumes more bandwidth and processing power2.Option A is incorrect, because BFD can be used to monitor tunnels. BFD is a protocol that can be used to quickly detect failures in the forwarding path between two adjacent routers or switches. BFD can be integrated with various routing protocols and link aggregation protocols to provide faster convergence and fault recovery. BFD can also be used to monitor the connectivity of tunnels, such as GRE, IPsec, or MPLS.Option C is incorrect, because IP-IP tunnels are stateless. IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features. IP-IP tunnels are stateless, which means that they do not keep track of the state or status of the tunnel connection. Stateless tunnels do not require any signaling or negotiation between the endpoints, but they also do not provide any error detection or recovery mechanisms.1:What is Tunneling? | Tunneling in Networking2:What Is Tunnel In Networking, Its Types, And Its Benefits?: [Configuring Bidirectional Forwarding Detection] : [IP-IP Tunneling]
A tunnel is a connection between two computer networks, in which data is sent from one network to another through an encrypted link. Tunnels are commonly used to secure data communications between two networks or to connect two networks that use different protocols.
Option B is correct, because tunnel endpoints must have a valid route to the remote tunnel endpoint. A tunnel endpoint is the device that initiates or terminates a tunnel connection. For a tunnel to be established, both endpoints must be able to reach each other over the underlying network.This means that they must have a valid route to the IP address of the remote endpoint1.
Option D is correct, because tunnels add additional overhead to packet size. Tunnels work by encapsulating packets: wrapping packets inside of other packets. This means that the original packet becomes the payload of the surrounding packet, and the surrounding packet has its own header and trailer. The header and trailer of the surrounding packet add extra bytes to the packet size, which is called overhead. Overhead can reduce the efficiency and performance of a network, as it consumes more bandwidth and processing power2.
Option A is incorrect, because BFD can be used to monitor tunnels. BFD is a protocol that can be used to quickly detect failures in the forwarding path between two adjacent routers or switches. BFD can be integrated with various routing protocols and link aggregation protocols to provide faster convergence and fault recovery. BFD can also be used to monitor the connectivity of tunnels, such as GRE, IPsec, or MPLS.
Option C is incorrect, because IP-IP tunnels are stateless. IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features. IP-IP tunnels are stateless, which means that they do not keep track of the state or status of the tunnel connection. Stateless tunnels do not require any signaling or negotiation between the endpoints, but they also do not provide any error detection or recovery mechanisms.
1:What is Tunneling? | Tunneling in Networking2:What Is Tunnel In Networking, Its Types, And Its Benefits?: [Configuring Bidirectional Forwarding Detection] : [IP-IP Tunneling]



Question 3

Which statement is correct about IP-IP tunnels?


  1. IP-IP tunnels only support encapsulating IP traffic.
  2. IP-IP tunnels only support encapsulating non-IP traffic.
  3. The TTL in the inner packet is decremented during transit to the tunnel endpoint.
  4. There are 24 bytes of overhead with IP-IP encapsulation.
Correct answer: A
Explanation:
IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features.IP-IP tunnels only support encapsulating IP traffic, which means that the payload of the inner packet must be an IP packet.IP-IP tunnels cannot encapsulate non-IP traffic, such as Ethernet frames or MPLS labels1.Option A is correct, because IP-IP tunnels only support encapsulating IP traffic. Option B is incorrect, because IP-IP tunnels only support encapsulating non-IP traffic. Option C is incorrect, because the TTL in the inner packet is not decremented during transit to the tunnel endpoint.The TTL in the outer packet is decremented by each router along the path, but the TTL in the inner packet is preserved until it reaches the tunnel endpoint2. Option D is incorrect, because there are 20 bytes of overhead with IP-IP encapsulation.The overhead consists of the header of the outer packet, which has a fixed size of 20 bytes for IPv43.1:IP-IP Tunneling2:What is tunneling? | Tunneling in networking3: IPv4 - Header
IP-IP tunnels are a type of tunnels that use IP as both the encapsulating and encapsulated protocol. IP-IP tunnels are simple and easy to configure, but they do not provide any security or authentication features.
IP-IP tunnels only support encapsulating IP traffic, which means that the payload of the inner packet must be an IP packet.IP-IP tunnels cannot encapsulate non-IP traffic, such as Ethernet frames or MPLS labels1.
Option A is correct, because IP-IP tunnels only support encapsulating IP traffic. Option B is incorrect, because IP-IP tunnels only support encapsulating non-IP traffic. Option C is incorrect, because the TTL in the inner packet is not decremented during transit to the tunnel endpoint.The TTL in the outer packet is decremented by each router along the path, but the TTL in the inner packet is preserved until it reaches the tunnel endpoint2. Option D is incorrect, because there are 20 bytes of overhead with IP-IP encapsulation.The overhead consists of the header of the outer packet, which has a fixed size of 20 bytes for IPv43.
1:IP-IP Tunneling2:What is tunneling? | Tunneling in networking3: IPv4 - Header









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files