JN0-664 Juniper Service Provider Routing & Switching Certification Exam

Posted by:admin Posted on:May 15,2023

Exam Code : JN0-664
Prerequisite Certification : JNCIS-SP
Exam Length : 90 minutes
Exam Type : 65 multiple-choice questions
Software Versions : Junos OS 22.3
Recertification :
Juniper certifications are valid for three years. For more information, please see Recertification.

The Service Provider Routing and Switching track enables you to demonstrate a thorough understanding of networking technology in general and Juniper Networks service provider routing and switching platforms. JNCIP-SP, the professional-level certification in this track, is designed for networking professionals with advanced knowledge of routing and switching implementations in Junos. The written exam verifies your basic understanding of advanced routing technologies and related platform configuration and troubleshooting skills.

This track contains four certifications:
JNCIA-Junos: Junos, Associate. For details, see JNCIA-Junos.
JNCIS-SP: Service Provider Routing and Switching, Specialist. For details, see JNCIS-SP.
JNCIP-SP: Service Provider Routing and Switching, Professional. For details, see the sections below.
JNCIE-SP: Service Provider Routing and Switching, Expert. For details, see JNCIE-SP.

Examkingdom Juniper JN0-664 Exam pdf,

MCTS Training, MCITP Trainnig

Best Juniper JN0-664 Free downloads , Juniper JN0-664 Dumps at Certkingdom.com

Exam Preparation
We recommend the following resources to help you prepare for your exam. However, these resources aren’t required, and using them doesn’t guarantee you’ll pass the exam.

Recommended Training
Advanced Junos Service Provider Routing (AJSPR)
Junos Layer 2 VPNs (JL2V)
Junos Layer 3 VPNs (JL3V)

Exam Resources
Industry/product knowledge
Juniper TechLibrary

Additional Preparation
Juniper Learning Portal

Exam Objectives
Here is a high-level view of the skillset required to successfully complete the JNCIP-SP certification exam.

Exam Objective
OSPF

Describe the concepts, operation, or functionality of OSPFv2 and OSPFv3:
OSPF area types and operations
Link-state advertisement (LSA) flooding through an OSPF multi-area network
Designated router/backup designated router operation
Shortest-path-first (SPF) algorithm
Metrics, including external metric types
Summarize and restrict routes
Virtual links
OSPFv2 vs. OSPFv3

Given a scenario, demonstrate knowledge of how to configure or monitor single-area or multi-area OSPF:
Implement OSPF routing policy
IS-IS

Describe the concepts, operation, or functionality of IS-IS:
IS-IS areas/levels and operations
Label-switched path (LSP) flooding through an IS-IS multi- area network
Designated intermediate system (DIS) operation
SPF algorithm
Metrics, including wide metrics
Route summarization and route leaking

Given a scenario, demonstrate knowledge of how to configure or monitor single-area or multi-area IS-IS:
Implement IS-IS routing policy
BGP

Describe the concepts, operation, or functionality of BGP:
BGP route selection process
Next-hop resolution
BGP attributes—concept and operation
BGP communities
Regular expressions
Multipath
Multihop
Load balancing
Advanced BGP options
BGP route damping
BGP flowspec
Multiprotocol BGP

Describe the concepts, operation, or functionality of BGP scaling mechanisms:
Route reflection
Given a scenario, demonstrate knowledge of how to configure or monitor BGP:
Implement BGP routing policy
Class of Service (CoS)

Describe the concepts, operation, or functionality of Junos OS CoS:
CoS processing on Junos OS devices
CoS header fields
Forwarding classes
Classification
Packet loss priority
Policers
Schedulers
Drop profiles
Rewrite rules

Given a scenario, demonstrate knowledge of how to configure or monitor CoS.
IP Multicast

Describe the concepts, operation, or functionality of IP multicast:
Components of IP multicast, including multicast addressing
IP multicast traffic flow
Any-source multicast (ASM) versus source-specific multicast (SSM)
Reverse path forwarding (RPF)—concept and operation
Internet Group Management Protocol (IGMP)
Physical Interface Module (PIM) dense mode and sparse mode
Rendezvous point (RP)—concept, operation, discovery, election
Source-specific multicast (SSM)—requirements, benefits, address ranges
Anycast rendezvous point (RP)

Given a scenario, demonstrate knowledge of how to configure or monitor IGMP, PIM dense mode, or PIM sparse mode (including SSM):
Implement IP multicast routing policy
Layer 3 VPNs

Describe the concepts, operation, or functionality of Layer 3 VPNs:
Traffic flow—control and data planes
Full mesh versus hub-and-spoke topology
VPN-IPv4 addressing
Route distinguishers
Route targets
Route distribution
Site of origin
Sham links
Virtual routing and forwarding (VRF) table-label
Next-generation multicast virtual private networks (MVPNs)
Flow of control and data traffic in a MVPN
Layer 3 VPN scaling
IPv6 Layer 3 VPNs
Layer 3 VPN Internet access options

Given a scenario, demonstrate knowledge of how to configure or monitor the components of Layer 3 VPNs.
Describe Junos OS support for carrier-of-carriers or inter-provider VPN models.
Layer 2 VPNs


Describe the concepts, operation, or functionality of BGP Layer 2 VPNs:
Traffic flow—control and data planes
Forwarding tables
Connection mapping
Layer 2 VPN network layer reachability information (NLRI)
Route distinguishers
Route targets
Layer 2 VPN scaling

Describe the concepts, operation, or functionality of LDP Layer 2 circuits:
Traffic flow—control and data planes
Virtual circuit label
Autodiscovery (AD)
Layer 2 interworking

Describe the concepts, operation, or functionality of virtual private LAN service (VPLS):
Traffic flow—control and data planes
BGP VPLS label distribution
LDP VPLS label distribution
Route targets
VPLS multihoming
Site IDs

Describe the concepts, operation, or functionality of EVPN:
Traffic flow—control and data planes
Media access control (MAC) learning and distribution
Ethernet VPN (EVPN) multihoming
BGP EVPN label distribution

Given a scenario, demonstrate knowledge of how to configure, monitor, or troubleshoot Layer 2 VPNs:
BGP Layer 2 VPNs
LDP Layer 2 circuits
EVPNs
VPLS

Exam Details
Exam questions are derived from the recommended training and the exam resources listed above. Pass/fail status is available immediately after taking the exam. The exam is only provided in English.

QUESTION 1
Exhibit.
Referring to the exhibit; the 10.0.0.0 EBGP route is received on R5; however, the route is being hidden.
What are two solutions that will solve this problem? (Choose two.)

A. On R4, create a policy to change the BGP next hop to itself and apply it to IBGP as an export policy
B. Add the external interface prefix to the IGP routing tables
C. Add the internal interface prefix to the BGP routing tables.
D. On R4, create a policy to change the BGP next hop to 172.16.1.1 and apply it to IBGP as an export policy

Answer: AB

Explanation:
the default behavior for iBGP is to propagate EBGP-learned prefixes without changing the next-hop.
This can cause issues if the next-hop is not reachable via the IGP. One solution is to use the next-hop
self command on R4, which will change the next-hop attribute to its own loopback address. This way,
R5 can reach the next-hop via the IGP and install the route in its routing table.
Another solution is to add the external interface prefix (120.0.4.16) to the IGP routing tables of R4
and R5. This will also make the next-hop reachable via the IGP and allow R5 to use the
route. According to 2, this is a possible workaround for a pure IP network, but it may not work well
for an MPLS network.

QUESTION 2
You are responding to an RFP for a new MPLS VPN implementation. The solution must use LDP for
signaling and support Layer 2 connectivity without using BGP The solution must be scalable and
support multiple VPN connections over a single MPLS LSP The customer wants to maintain all routing
for their Private network
In this scenario, which solution do you propose?

A. circuit cross-connect
B. BGP Layer 2 VPN
C. LDP Layer 2 circuit
D. translational cross-connect

Answer: C

Explanation:
AToM (Any Transport over MPLS) is a framework that supports various Layer 2 transport types over
an MPLS network core. One of the transport types supported by AToM is LDP Layer 2 circuit, which is
a point-to-point Layer 2 connection that uses LDP for signaling and MPLS for forwarding. LDP Layer 2
circuit can support Layer 2 connectivity without using BGP and can be scalable and efficient by using
a single MPLS LSP for multiple VPN connections. The customer can maintain all routing for their
private network by using their own CE switches.

QUESTION 3
Exhibit.
Referring to the exhib.t, what must be changed to establish a Level 1 adjacency between routers R1 and R2?

A. Change the level l disable parameter under the R1 protocols isis interface lo0.0 hierarchy to the level 2 disable parameter.
B. Remove the level i disable parameter under the R2 protocols isis interface loo . 0 configuration hierarchy.
C. Change the level 1 disable parameter under the R2 protocols isis interface ge-1 .0 hierarchy to the level 2 disable parameter
D. Add IP addresses to the interface ge-l unit 0 family iso hierarchy on both R1 and R2.

Answer: B

Explanation:
IS-IS routers can form Level 1 or Level 2 adjacencies depending on their configuration and network
topology. Level 1 routers are intra-area routers that share the same area address with their
neighbors. Level 2 routers are inter-area routers that can connect different areas. Level 1-2 routers
are both intra-area and inter-area routers that can form adjacencies with any other router.
In the exhibit, R1 and R2 are in different areas (49.0001 and 49.0002), so they cannot form a Level 1
adjacency. However, they can form a Level 2 adjacency if they are both configured as Level 1-2
routers. R1 is already configured as a Level 1-2 router, but R2 is configured as a Level 1 router only,
because of the level 1 disable command under the lo0.0 interface. This command disables Level 2
routing on the loopback interface, which is used as the router ID for IS-IS.
Therefore, to establish a Level 1 adjacency between R1 and R2, the level 1 disable command under
the R2 protocols isis interface lo0.0 hierarchy must be removed. This will enable Level 2 routing on
R2 and allow it to form a Level 2 adjacency with R1.

QUESTION 4

You are asked to protect your company’s customers from amplification attacks. In this scenario, what is Juniper’s recommended protection method?

A. ASN prepending
B. BGP FlowSpec
C. destination-based Remote Triggered Black Hole
D. unicast Reverse Path Forwarding

Answer: C

Explanation:
amplification attacks are a type of distributed denial-of-service (DDoS) attack that exploit the
characteristics of certain protocols to amplify the traffic sent to a victim. For example, an attacker can
send a small DNS query with a spoofed source IP address to a DNS server, which will reply with a
much larger response to the victim. This way, the attacker can generate a large amount of traffic with

Click to rate this post!
[Total: 0 Average: 0]

admin

No description.Please update your profile.