Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

JN0-650 Juniper Enterprise Routing and Switching - Professional (JNCIP-ENT) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Juniper JN0-650 Enterprise Routing and Switching - Professional (JNCIP-ENT) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 72 questions

You are evaluating a BGP routing policy that has a route-filter clause that includes its own action (e.g.. accept) within the filter block. The policy is also using a then clause.

Which statement is correct in this scenario?

A.

The policy ignores the filter action and defers to the then clause.

B.

The filter action is treated as a suggestion and combined with the then action.

C.

The filter action is applied only if no then action is defined

D.

The filter ' s accept action executes immediately upon matching and the then clause is ignored.

Which three conditions does the Junos OS use to create a figure-of-merit value for each BGP route in the routing table? (Choose three.)

A.

The route is withdrawn.

B.

The route has a configured local preference.

C.

The route is readvertised.

D.

The route is from IBGP or EBGP.

E.

The route ' s path attributes changed.

Your router is discarding an EBGP route because the next hop is not directly connected. Which BGP configuration would you use to override this behavior?

A.

accept-remote-nexthop

B.

multihop

C.

advertise-inactive

D.

multipath

Click the Exhibit button.

You are troubleshooting suboptimal routing in an enterprise OSPFv2 deployment:

-- R1 is an ABR between Area 0 and Area 1.

-- R2 is an ABR between Area 0 and Area 2.

-- R3 in Area 1 advertises a network that should be reachable by routers in Area 2.

-- The ABRs are connected in the backbone (Area 0).

On router R2, the show ospf database does not display router LSAs or network LSAs from Area 1, but an interarea route to R3’s network exists in the routing table. R2 does not have Type-1 or Type-2 LSAs from Area 1 in its OSPF database.

Referring to the exhibit, which statement is correct?

A.

R2 is filtering them using the OSPF import policy.

B.

Junos disables Type-1 and Type-2 LSAs by default in Interarea LSDBs.

C.

R2 is running OSPFv3, which does not use Type-1 or Type-2 LSAs.

D.

Type-1 and Type-2 LSAs are summarized into Type-3 LSAs by ABRs and do not cross area boundaries.

Your Layer 2 network uses 802.1X to authenticate user devices connecting to the network. You are asked to include a new Layer 2 interface connection from the conference room in your network. You must ensure that only a single device is allowed to authenticate on this port at one time to avoid users from being able to plug in a rogue switch to this port.

In this scenario, which 802.1X method would you use for the new interface?

A.

single-secure supplicant mode

B.

multiple supplicant mode

C.

single supplicant mode

D.

MAC-RADIUS

Exhibit.

You have determined that traffic in your network is being routed through your route reflector instead of using the optimal path. Referring to the exhibit, what are two configuration changes on the route reflector that would solve the problem? (Choose two.)

A.

set policy-options policy-statement NHS term 10 from route-type external

B.

set protocols bgp group int-group import NHS

C.

delete protocols bgp group int-group export IfJHS

D.

set policy-options policy-statement NHS term 10 from route-type internal

When configuring OSPF. what is the purpose of adding the secondary command to an OSPF interface?

A.

The secondary command is used in conjunction with VRRP for failover.

B.

The secondary command allows an interface to be in multiple areas.

C.

The secondary command creates an mtra-area backup path.

D.

The secondary command sets a backup path for virtual links

Exhibit.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

R1 will advertise the 203 0.113.0724 route as an OSPF Type 7 LSA into Area 0.

B.

R5 will advertise the 203 0.113 0/24 route as an OSPF Type 5 LSA into Area 1.

C.

R1 will advertise the 203 0.113.0/24 route as an OSPF Type 5 LSA into Area 0

D.

R5 will advertise the 203 0.113.0/24 route as an OSPF Type 7 LSA into Area 1.

Exhibit

Referring to the exhibit output, which statement is correct?

A.

The device with an IP address of 192.168.100 2 is attached to VNI 5010

B.

The output shows the router ID of the device sending the EVPN Type 2 routes

C.

The output shows the route distinguisher of the device sending the EVPN Type 2 routes

D.

IP addresses 10.1.1.1 and 10.1 2.3 are connected to the same VNI.

According to IETF standards, which two statements are correct about EVPN/VXLAN deployments? (Choose two.)

A.

Up to 16 million EVPN broadcast domains can exist.

B.

Up to 16 million VXLAN broadcast domains can exist.

C.

IP packets within the same broadcast domain are forwarded unchanged.

D.

Layer 2 frames within the same broadcast domain are forwarded unchanged.

You are configuring CoS throughout your enterprise network using DSCP. You have configured MF classification on your edge devices and are using BA classifiers throughout the core You are using the EZQoS template provided on your EX Series switches that are acting as your edge devices. You have loaded the configuration group and applied it to the appropriate interfaces. Classification and scheduling are working properly on your edge devices; however, traffic is not being classified correctly when it reaches your core devices

In this scenario, which statement is correct about solving this problem?

A.

You should configure and apply a policer to the edge devices ' egress interfaces toward the core.

B.

You must configure the core devices using the EZQoS template as well

C.

You should configure and apply rewrite rules on the edge devices ' egress interfaces toward the core

D.

You must configure the edge devices to use BA classifiers instead of MF classifiers

Which three statements about VSTP are correct? (Choose three.)

A.

Separate BPDUs are Hooded for each VSTP enabled VLAN.

B.

VSTP is incompatible with RSTR

C.

VSTP is enabled by default on EX Series switches.

D.

VSTP supports up to 253 unique spanning tree topologies.

E.

A separate spanning tree instance is generated for each VLAN.

Which two statements correctly describe how EX Series switches use captive portal for Layer 2 authentication? (Choose two.)

A.

The captive portal is the default Layer 2 authentication method that is applied before other methods such as 802 1X or MAC RADIUS.

B.

The captive portal authentication allowlist works for devices that do not have HTTP capabilities.

C.

The captive portal is configured on Layer 3 interfaces and does not participate in Layer 2 authentication on EX Series switches.

D.

The captive portal is used as a fallback mechanism for clients that fail 802.1X or MAC RADIUS authentication.

You are troubleshooting a multicast deployment in a network. Some multicast groups operate in PIM-ASM mode and others operate in PIM-SSM mode. While troubleshooting, you note the following:

- The network uses IGMPv2 for some segments and IGMPv3 for others.

- For group 232.1.1.1, receivers know the exact source IP of the multicast sender

- For group 239.10.10.10. receivers do not know the source address in advance.

Which two statements correctly describe the operational differences between these two modes in Junos OS? (Choose two.)

A.

PIM-ASM supports multiple active sources for a group without requiring receivers to know them in advance, whereas PIM-SSM requires explicit source knowledge

B.

In PIM-ASM. the DR first sends a PIM register message to the RP before switching to the shortest-path tree.

C.

PIM-SSM requires an RP for initial joins, whereas PIM-ASM can operate without one.

D.

PIM-SSM relies on IGMPv3 to signal both the source and the group in the join message, bypassing the RP entirely.

You are asked to configure 802.1X on an EX Series switch port that connects to a downstream switch with several devices attached. You must ensure that the first device is authenticated while all subsequent devices are permitted.

What will accomplish this request?

A.

single supplicant

B.

MAC RADIUS

C.

single-secure supplicant

D.

multiple supplicant

You are deploying a three-stage EVPN environment with VXLAN using EX and QFX Series switches. The leaf devices will perform the gateway services. Which two statements are correct in this scenario? (Choose two.)

A.

Only the leaf devices must support VXLAN capabilities.

B.

The leaf devices will function as VTEPs

C.

Both the leaf and spine devices must support VXLAN capabilities.

D.

The spine devices will function as VTEPs.

You are asked to establish authentication for users connecting to the corporate network. You must ensure that only corporate devices that are identified by MAC addresses are allowed to authenticate and connect Authentication must be handled by a centralized database.

Which authentication method would you implement in this scenario?

A.

MAC RADIUS

B.

captive portal

C.

single-secure supplicant mode

D.

single supplicant mode

Which statement about LLDP and LLDP-MED operations on EX Series devices is correct?

A.

LLDP only operates on interfaces configured for Layer 2

B.

EX Series devices flood LLDP frames across a Layer 2 domain to calculate a network topology

C.

EX Series devices support LLDP-MED power negotiation, enabling dynamic allocation of PoE power based on endpoint device needs.

D.

LLDP-MED focuses on discovering network connectivity devices like routers and switches.

Which statement accurately describes the operation of OSPF within the Junos OS?

A.

OSPF calculates routes using a distance vector algorithm.

B.

OSPF is used for routing information and neighbor discovery within a single autonomous system (AS).

C.

OSPF does not automatically advertise directly connected routes.

D.

OSPF is used for routing information and neighbor discovery between multiple autonomous systems.

The network you support currently has a mixture of MC-LAG and Virtual Chassis being used to provide redundant connectivity from various IDFs. A project to modernize the architecture and move to EVPN-VXLAN using ESI-LAG will be starting soon. You want to avoid IDFs losing connectivity as the core devices are migrated to EVPN-VXLAN. Which action will accomplish this task?

A.

Enable EVPN-VXLAN on the leaf devices before starting the migration.

B.

Remove the links between the MC-LAG leaf devices and disable Virtual Chassis.

C.

Enable no-core-isolation on the core devices.

D.

Enable network-isolation-profile on the leaf devices.

Page: 1 / 1
Total 72 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved