A user is attempting to watch a high-definition video being streamed from the media server over the network. However, the user complains that the experienced video quality is poor. While logged on to router B, a Juniper Networks device, you notice that video packets are being dropped.
In this scenario, what would solve this problem?
Answer : A
transmit rate is set on the scheduler, BA and classifier do not have transmit rate. scheduler-map=maps schedulers to fwd classes
You are deploying an 802.1X solution and must determine what would happen if clients are unable to re-authenticate to the RADIUS server.
In this scenario, which configuration would provide access to the network if the supplicant is already authenticated?
Answer : D
Referring to the outputs shown in the exhibit, which two statements are correct about the IS-IS adjacency? (Choose two.)
Answer : A, D
You enable the Multiple VLAN Registration Protocol (MVRP) to automate the creation and management of virtual LANs.
Which statement is correct in this scenario?
Answer : A
The forbidden mode does not register or declare VLANs. You can change the registration mode of a specific interface to forbidden. An interface in forbidden registration mode does not participate in MVRP even if MVRP is enabled on the switch.
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/topic-map/mvrp.html
MVRP is disabled by default on the switches and, when enabled, affects only trunk interfaces. Once you enable MVRP, all VLAN interfaces on the switch belong to MVRP (the default normal registration mode) and those interfaces accept PDU messages and send their own PDU messages. forbidden---The interface does not register or declare VLANS (except statically configured VLANs).
Referring to the exhibit, which two statements are correct? (Choose two.)
Answer : A, C
You are asked to establish interface level authentication for users connecting to your network. You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability.
Which authentication method would satisfy this requirement?
Answer : A
https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/topic-map/mac-radius-authentication-switching-devices.html
You can configure MAC RADIUS authentication on an interface that also allows 802.1X authentication, or you can configure either authentication method alone.
If both MAC RADIUS and 802.1X authentication are enabled on the interface, the switch first sends the host three EAPoL requests to the host. If there is no response from the host, the switch sends the host's MAC address to the RADIUS server to check whether it is a permitted MAC address. If the MAC address is configured as permitted on the RADIUS server, the RADIUS server sends a message to the switch that the MAC address is a permitted address, and the switch opens LAN access to the nonresponsive host on the interface to which it is connected.
Referring to the exhibit, which two statements are correct? (Choose two.)
Answer : A, C