December 4, 2020 by admin Juniper jn0-648 practice test Welcome to your Juniper jn0-648 practice test QUESTION 1 You are deploying PIM source-specific multicast (SSM) for a new multicast messaging service. You have configured themulticast source to use 235.44.123.100 as the multicast address. You are not able to join the PIM SSM multicast feed.Which two solutions would resolve this problem? (Choose two.) A. Reconfigure the multicast source to use an address in the range of 224.0.0.0 through 224.255.255.255. B. Reconfigure the multicast source to use an address in the range of 232.0.0.0 through 232.255.255.255. C. Add the multicast address to the [edit routing-options multicast ssm-map] stanza. D. Add the multicast address to the [edit routing-options multicast ssm-groups] stanza. QUESTION 2 Click the Exhibit button.You are investigating reports of increased latency and discover that some routes cause customer traffic to traverse aroute reflector instead of the optimal path. Referring to the exhibit, which configuration statement would solve theproblem? A. delete protocols BGP group BGP-MESH peer-as B. set policy-options policy-statement NHS term BGP_ROUTES from external C. set protocols BGP group BGP-MESH import NHS D. delete protocols BGP group BGP-MESH export NHS None QUESTION 3 In a Layer 2 environment where 802.1X is deployed, which two statements are correct? (Choose two.) A. RADIUS messages are exchanged between the supplicant and the authenticator. B. RADIUS messages are exchanged between the authenticator and the authentication server. C. Extensible Authentication Protocol messages are exchanged between the authenticator and the authentication server. D. Extensible Authentication Protocol messages are exchanged between the supplicant and the authenticator. QUESTION 4 Click the Exhibit button.A router is attempting to form an OSPF neighborship with another router. However, the OSPF neighborship fails toestablish completely.Referring to the exhibit, what is the problem? A. There is an interface type mismatch. B. There is an interface subnet mask mismatch. C. There is an OSPF area mismatch. D. There is an interface MTU mismatch. None QUESTION 5 What are the three well-known mandatory BGP attributes? (Choose three.) A. MED B. AS-path C. origin D. next-hop E. community QUESTION 6 Click the Exhibit button.You receive the same 75.100.0.0/16 route from all four ISPs to which you are connected. Referring to the exhibit, whichISP\\’s route will be selected as active? A. ISP-D B. ISP-C C. ISP-B D. ISP-A None QUESTION 7 Click the Exhibit button.You are adding VNI 101 to your EVPN-VXLAN network, but traffic is not being sent or received. Referring to the exhibit,which configuration statement will solve the problem? A. set routing-instances EVPN1 instance-type evpn B. set routing-instances EVPN1 vrf-table-label C. set routing-instances EVPN1 bridge-domains BD-101 vxlan vni 101 D. set routing-instances EVPN1 vxlan encapsulate-inner-VLAN None QUESTION 8 When configuring a class of service, what would you use to allocate bandwidth to a forwarding class? A. buffer depth B. transmit rate C. bandwidth D. speed None QUESTION 9 You have configured class mode power management on an EX4300 to provide PoE power to telephone and securitycamera equipment. You want to ensure that security camera power takes priority over telephone power. Which twoactions would solve this problem? (Choose two.) A. Connect the security cameras to the lowest port numbers on the switch. B. Set the power priority to high on ports connected to security cameras. C. Set the maximum power settings on ports connected to security cameras. D. Set the power priority to low on ports connected to security cameras. QUESTION 10 Click the Exhibit button.You have configured and applied the policer shown in the exhibit to your Junos device. Which statement is true in thisscenario? A. Traffic exceeding the committed-burst size will be marked with a loss priority of high. B. Traffic exceeding the excess-burst size will be discarded. C. Traffic exceeding the committed-information-rate will be rate limited. D. Traffic exceeding the committed-burst size will be discarded. None QUESTION 11 Which protocol is used for port-level access control and authentication? A. MD5 B. IPsec C. 802.1X D. AES None QUESTION 12 Click the Exhibit button.Referring to the exhibit, how is R5 able to learn the networks that exist within the NSSA? A. R5 learns those networks from Type 3 LSAs advertised by R2. B. R5 learns those networks from Type 3 LSAs advertised by R3. C. R5 does not learn those networks and uses a default route advertised by R3 instead. D. R5 does not learn those networks but uses a default route advertised by R2 instead. None QUESTION 13 Which two statements are correct about a functional ESI LAG interface? (Choose two.) A. The LACP system ID must be the same. B. The ESI values must be the same. C. The LACP system ID must be different. D. The ESI values must be different. Time's up