Exam Details
Exam questions are derived from the recommended training and the exam resources listed above. Pass/fail status is available immediately after taking the exam. The exam is only provided in English.

Exam Code: JN0-349
Prerequisite Certification: JNCIA-Junos
Delivered by: Pearson VUE
Exam Length: 90 minutes
Exam Type: 65 multiple-choice questions
Software Versions: Junos 21.1


Recertification
Juniper certifications are valid for three years. For more information, see Recertification.

Examkingdom Juniper JN0-349 Exam Brain dump pdf, Certkingdom Juniper JN0-349 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best Juniper JN0-349 Certification, Juniper JN0-349 Brain Dumps Training at certkingdom.com

Exam Objectives
Here’s a high-level view of the skillset required to successfully complete the JNCIS-ENT certification exam.

Exam Objective
Layer 2 Switching or VLANs

Identify the concepts, operation, or functionality of Layer 2 switching for the Junos OS
Bridging components
Frame processing

Describe the concepts, benefits, or functionality of VLANs
Ports
Tagging
Native VLANs and voice VLANs
Inter-VLAN routing

Demonstrate knowledge how to configure, monitor or troubleshoot Layer 2 switching or VLANs
Interfaces and ports
VLANs
Inter-VLAN Routing

Spanning Tree
Describe the concepts, benefits, operation, or functionality of the Spanning Tree Protocol
STP and RSTP concepts
Port roles and states
BPDUs
Convergence and reconvergence

Demonstrate knowledge how to configure, monitor, or troubleshoot Spanning Tree
STP
RSTP

Layer 2 Security
Identify the concepts, benefits or operation of various Layer 2 protection or security features
BPDU, loop or root protection
Port security, including MAC limiting, DHCP snooping, Dynamic ARP inspection (DAI) or IP source guard
MACsec
Storm control

Identify the concepts, benefits or operation of Layer 2 firewall filters
Filter types
Processing order
Match criteria and actions

Demonstrate knowledge how to configure, monitor, or troubleshoot Layer 2 security
Protection
Port security
Storm control
Firewall filter configuration and application

Protocol Independent Routing
Identify the concepts, operation or functionality of various protocol-independent routing components
Static, aggregate, and generated routes
Martian addresses
Routing instances, including RIB groups
Load balancing
Filter-based forwarding

Demonstrate knowledge how to configure, monitor, or troubleshoot various protocol-independent routing components
Static, aggregate, and generated routes
Load balancing
Filter-based forwarding

OSPF
Describe the concepts, operation or functionality of OSPF
Link-state database
OSPF packet types
Router ID
Adjacencies and neighbors
Designated router (DR) and backup designated router (BDR)
OSPF area and router types
Realms
LSA packet types

Demonstrate knowledge how to configure, monitor or troubleshoot OSPF
Areas, interfaces and neighbors
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

IS-IS
Describe the concepts, operation or functionality of IS-IS
Link-state database
IS-IS PDUs
TLVs
Adjacencies and neighbors
Levels and areas
Designated intermediate system (DIS)
Metrics

Demonstrate knowledge of how to configure, monitor or troubleshoot IS-IS
Levels, interfaces and adjacencies
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

BGP
Describe the concepts, operation or functionality of BGP
BGP basic operation
BGP message types
Attributes
Route/path selection process
IBGP and EBGP functionality and interaction

Demonstrate knowledge of how to configure, monitor, or troubleshoot BGP
Groups and peers
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

Tunnels
Identify the concepts, requirements or functionality of IP tunneling
Tunneling applications and considerations
GRE
IP-IP

Demonstrate knowledge of how to configure, monitor or troubleshoot IP tunnels
GRE
IP-IP
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

High Availability
Identify the concepts, benefits, applications or requirements for high availability in a Junos OS environment
Link aggregation groups (LAG)
Redundant trunk groups (RTG)
Virtual Chassis
Graceful restart (GR)
Graceful Routing Engine switchover (GRES)
Nonstop active routing (NSR)
Nonstop bridging (NSB)
Bidirectional Forwarding Detection (BFD)
Virtual Router Redundancy Protocol (VRRP)
Unified In-Service Software Upgrade (ISSU)

Demonstrate knowledge of how to configure, monitor, or troubleshoot high availability components
LAG and RTG
Virtual Chassis
GR, GRES, NSB, and NSR
VRRP
ISSU
Troubleshooting tools (e.g., trace options, show commands, logging)


QUESTION 1
What are two benefits of 802.3ad link aggregation? (Choose two)

A. It increases bandwidth
B. It ensures symmetrical paths
C. It simplifies interface configuration.
D. It creates physical layer redundancy.

Answer: A, D

Aggregating multiple links between physical interfaces creates a single logical point-to-point trunk
link or a LAG. The LAG balances traffic across the member links within an aggregated Ethernet bundle
and effectively increases the uplink bandwidth. Another advantage of link aggregation is increased
availability, because the LAG is composed of multiple member links. If one member link fails, the LAG
continues to carry traffic over the remaining links.
https://www.juniper.net/documentation/us/en/software/junos/interfaces-ethernetswitches/
topics/topic-map/switches-interface-aggregated.html


QUESTION 2
Which statement is true about IP-IP tunnels?

A. Intermediate devices must have a route to the destination address of the traffic being tunneled.
B. Intermediate devices must have a route to both the tunnel source address and the tunnel destination address.
C. Intermediate devices must have a route to the tunnel destination address but do not require a route to the tunnel source address.
D. Intermediate devices must have a route to the tunnel source address but do not require a route to the tunnel destination address

Answer: B


QUESTION 3
You have a conference room with an open network port that is used by employees to connect to the
network. You are concerned about rogue switches being connected to this port
Which two features should you enable on your switch to limit access to this port? (Choose two.)

A. DHCP snooping
B. dynamic ARP inspection
C. MAC limiting
D. 802.1X

Answer: A, B


QUESTION 4
Which two port security features use the DHCP snooping database for additional port security?
(Choose two.)

A. dynamic ARP inspection
B. MACsec
C. IP Source guard
D. MAC learning

Answer: A, C


 

Click to rate this post!
[Total: 0 Average: 0]