ExamGecko
Home / Juniper / JN0-1362 / List of questions
Ask Question

Juniper JN0-1362 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

You are developing a CoS policy for a service provider core network that In this scenario, which three statements are correct? (Choose three.)

Core routers should use a common set of per-hop behaviors.
Core routers should use a common set of per-hop behaviors.
Core routers should use shapers to ensure that customer traffic does not exceed allowed bandwidth.
Core routers should use shapers to ensure that customer traffic does not exceed allowed bandwidth.
Core routers should use policers to ensure that customer traffic does not exceed allowed bandwidth.
Core routers should use policers to ensure that customer traffic does not exceed allowed bandwidth.
Core routers should use a consistent CoS configuration across the network.
Core routers should use a consistent CoS configuration across the network.
Core routers should use the DSCP markings already set on ingress traffic.
Core routers should use the DSCP markings already set on ingress traffic.
Suggested answer: A, C, E
asked 18/09/2024
Jose Osnayo
47 questions

Question 12

Report Export Collapse

A customer wants to consolidate all remote site connections into a single enterprise WAN for backhual to the corporate headquarters and data centers.

Which solution satisfies this requirement?

private WAN
private WAN
WAN aggregation
WAN aggregation
Data Center Interconnect
Data Center Interconnect
Internet edge
Internet edge
Suggested answer: C
asked 18/09/2024
Frederico DionΓƒ­sio
45 questions

Question 13

Report Export Collapse

You are asked to provide a design proposal for a service provider network that will need to support both IPv4 and IPv6 traffic across your IPv4 core. You do not want to change the core design.

In this scenario, what are two solutions that you would implement at the peering edge? (Choose two.)

6PE
6PE
NAT64
NAT64
GRE tunneling
GRE tunneling
native IPv6 routing
native IPv6 routing
Suggested answer: A, D
asked 18/09/2024
Unai M
46 questions

Question 14

Report Export Collapse

You work for a service provider who wants to provide a service to your customers consisting of VoIP, live TV, video on demand (VoD), and data services You want to use a hybnd VLAN model for this service Which VLAN assignments would be used for this deployment?

Video services will reside in a shared video VLAN. and the customer willHjttlttjftvo data VLANs assigned, one for voice and one for data.
Video services will reside in a shared video VLAN. and the customer willHjttlttjftvo data VLANs assigned, one for voice and one for data.
Live TV will be multicast to all customers, video on demand, voice, and data will share a customer specific VLAN.
Live TV will be multicast to all customers, video on demand, voice, and data will share a customer specific VLAN.
Live TV will be multicast to all customers, video on demand and data will share a customer specific VLAN, VoIP will use a shared VLAN utilizing private VLANs to talk to a telephony server.
Live TV will be multicast to all customers, video on demand and data will share a customer specific VLAN, VoIP will use a shared VLAN utilizing private VLANs to talk to a telephony server.
Live TV and VoD will be in the same shared VLAN with Live TV on a multicast stream and VoD unicast, voice and data will reside in a customer specific VLAN.
Live TV and VoD will be in the same shared VLAN with Live TV on a multicast stream and VoD unicast, voice and data will reside in a customer specific VLAN.
Suggested answer: C
asked 18/09/2024
Premier Lane
42 questions

Question 15

Report Export Collapse

A customer requests that you design their Layer 3 VPN solution so that all site-to-site traffic goes through a central site, in a hub-and-spoke fashion You must choose between using one or two interfaces on the hub WAN link.

In this scenario, which solution would you use?

Use two interfaces on the hub WAN link to allow traffic to go from the spokes to the hub on one interface and from the hub to the spokes on the other interface.
Use two interfaces on the hub WAN link to allow traffic to go from the spokes to the hub on one interface and from the hub to the spokes on the other interface.
Use two interfaces on the hub WAN link to reserve one interface for higher Priority traffic.
Use two interfaces on the hub WAN link to reserve one interface for higher Priority traffic.
Use one interface on the hub WAN link, since both hub and spoke sites will require a second VRF for route-leaking purposes.
Use one interface on the hub WAN link, since both hub and spoke sites will require a second VRF for route-leaking purposes.
Use one interface on the hub WAN link to ensure simplicity, since only a single route target is required across the entire Layer 3 VPN.
Use one interface on the hub WAN link to ensure simplicity, since only a single route target is required across the entire Layer 3 VPN.
Suggested answer: D
asked 18/09/2024
Alex Bu
61 questions

Question 16

Report Export Collapse

You are responding to an RFP that proposes using MX Series devices for subscriber management services.

In this scenario, which two protocols should you consider for the AAA components? (Choose two )

RADIUS
RADIUS
PPPoE
PPPoE
DHCP
DHCP
Diameter
Diameter
Suggested answer: A, C
asked 18/09/2024
Pouyan Bani Shahabadi
36 questions

Question 17

Report Export Collapse

What are two risks when using a source-based RTBH solution? (Choose TWO)

The attacker address could be a CGNAT address resulting in a larger service outage for users.
The attacker address could be a CGNAT address resulting in a larger service outage for users.
The target of the attack may not support RTBH.
The target of the attack may not support RTBH.
The attacker's address could be unknown.
The attacker's address could be unknown.
The target of an attack would be blocked resulting in a target being offline.
The target of an attack would be blocked resulting in a target being offline.
Suggested answer: A, B
asked 18/09/2024
Mehdi BELGAS
54 questions

Question 18

Report Export Collapse

As a service provider network architect, you are working with a potential customer who wants to replace their WAN, consisting of two data centers, one HQ, and 76 branch offices Due to application latency requirements between branch offices, the customer insists that all traffic must take the most optimal path through the service provider network. The customer intends to encrypt all traffic between customer routers at each location.

Which WAN technology would you propose in this scenario?

point-to-point Layer 2 VPNs
point-to-point Layer 2 VPNs
Layer 3 VPN
Layer 3 VPN
Internet as WAN
Internet as WAN
H-VPLS
H-VPLS
Suggested answer: C
asked 18/09/2024
Mark Josef Delos Santos
38 questions

Question 19

Report Export Collapse

Which statement is correct about learning remote host MAC addresses when your DCI is based on EVPN?

No MAC learning by the provider edge (PE) device is performed
No MAC learning by the provider edge (PE) device is performed
Static MAC configuration on the provider edge (PE) device is perform
Static MAC configuration on the provider edge (PE) device is perform
Data plane MAC learning by the provider edge (PE) device is performed.
Data plane MAC learning by the provider edge (PE) device is performed.
Control plane MAC learning by the provider edge (PE) device
Control plane MAC learning by the provider edge (PE) device
Suggested answer: C
asked 18/09/2024
Okan YILDIZ
46 questions

Question 20

Report Export Collapse

You are designing a full mesh of connections between multiple enterprise In this scenario, which two statements are correct? (Choose two.)

Security and Internet control is applied at a central location
Security and Internet control is applied at a central location
All sites are able to communicate directly with each other
All sites are able to communicate directly with each other
It is easier for administrators to enforce application-aware services with a single point of management.
It is easier for administrators to enforce application-aware services with a single point of management.
IPsec tunnels can be used to secure traffic between sites.
IPsec tunnels can be used to secure traffic between sites.
Suggested answer: A, B
asked 18/09/2024
Jason Kelley
37 questions
Total 65 questions
Go to page: of 7
Search

Related questions