ExamGecko
Home Home / Juniper / JN0-1362

Juniper JN0-1362 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











According to Juniper Networks, which two statements describe OoB network design best practices?

(Choose two.)

A.
Ensure that all users are authenticated using individual accounts and credentials.
A.
Ensure that all users are authenticated using individual accounts and credentials.
Answers
B.
Ensure that the management network is accessible through the production network.
B.
Ensure that the management network is accessible through the production network.
Answers
C.
Ensure that the management network uses a unique IP network.
C.
Ensure that the management network uses a unique IP network.
Answers
D.
Ensure that only console ports are used to manage devices.
D.
Ensure that only console ports are used to manage devices.
Answers
Suggested answer: C, D

Your customer is deploying a multitenant data center and needs help with the WAN edge design.

What are two mam design considerations for this environment? (Choose two.)

A.
control plane redundancy
A.
control plane redundancy
Answers
B.
NAT requirements
B.
NAT requirements
Answers
C.
unified threat management
C.
unified threat management
Answers
D.
Virtual Chassis Control Protocol
D.
Virtual Chassis Control Protocol
Answers
Suggested answer: B, C

Since deploying VPLS, you notice an unusually high level of traffic In your nine topology. On further inspection, you determine that broadcast traffic is causing the problem. The traffic is legitimate.

Nevertheless, you are asked to look into options that allow the network to scale.

In this scenario, what would you do to solve the problem?

A.
Mark broadcast traffic with a high drop priority.
A.
Mark broadcast traffic with a high drop priority.
Answers
B.
Move from LDP-signaled VPLS to BGP-signaled VPLS.
B.
Move from LDP-signaled VPLS to BGP-signaled VPLS.
Answers
C.
Add a broadcast policer and an unknown unicast policer to each VPLS.
C.
Add a broadcast policer and an unknown unicast policer to each VPLS.
Answers
D.
Deploy P2MP LSPs.
D.
Deploy P2MP LSPs.
Answers
Suggested answer: D

Click the Exhibit button:

Referring to the exhibit, which mechanism is used to advertise routes from the enterprise network to the service provider network?

A.
BGP flowspec
A.
BGP flowspec
Answers
B.
BGP export policies
B.
BGP export policies
Answers
C.
BGP import policies
C.
BGP import policies
Answers
D.
firewall filters
D.
firewall filters
Answers
Suggested answer: C

A customer reports a network outage at a branch office after users have reported intermittent Internet connectivity Upon further investigation, you determine that there is significant packet loss and that the majority of traffic on the

WAN consists of DNS responses from many different sources.

In this scenario, which design consideration would reduce further occurrences with minimal chance of affecting valid traffic?

A.
Implement CGNAT
A.
Implement CGNAT
Answers
B.
Create a firewall filter to drop all traffic to the affected destination address of the attack
B.
Create a firewall filter to drop all traffic to the affected destination address of the attack
Answers
C.
Create a firewall filter to drop all traffic based on the source addresses of the attack.
C.
Create a firewall filter to drop all traffic based on the source addresses of the attack.
Answers
D.
Configure BGP flowspec.
D.
Configure BGP flowspec.
Answers
Suggested answer: A

You must build a portable and customizable template to secure the What are two components of this template? (Choose two )

A.
stateful firewall policy
A.
stateful firewall policy
Answers
B.
generic policers
B.
generic policers
Answers
C.
routing policy
C.
routing policy
Answers
D.
firewall filter
D.
firewall filter
Answers
Suggested answer: C, D

Your company is a large ISP that is upgrading their routers As part of the upgrade project, they want to implement a solution that will improve the effectiveness of their current RTBH solution for handling spoofed IP addresses coming across the WAN.

Which action would satisfy their requirement?

A.
Implement manual firewall policies
A.
Implement manual firewall policies
Answers
B.
Implement unicast RPF
B.
Implement unicast RPF
Answers
C.
Implement MACsec.
C.
Implement MACsec.
Answers
D.
Implement EVPN
D.
Implement EVPN
Answers
Suggested answer: D

Which RFC standards-based feature allows for customer-specific configuration parameters to be passed between RADIUS and a BRAS?

A.
DHCPv6 options
A.
DHCPv6 options
Answers
B.
DHCP options
B.
DHCP options
Answers
C.
vendor-specific attributes
C.
vendor-specific attributes
Answers
D.
LSA
D.
LSA
Answers
Suggested answer: C

You 2 VPN services to interconnect three of their sites.

A.
In this scenario, what are two functions of the CE device? (Choose two.)
A.
In this scenario, what are two functions of the CE device? (Choose two.)
Answers
B.
It maintains all customer Layer 3 routing information.
B.
It maintains all customer Layer 3 routing information.
Answers
C.
It selects the appropriate circuit on which to traverse the Layer 2 VPN.
C.
It selects the appropriate circuit on which to traverse the Layer 2 VPN.
Answers
D.
It maintains an MP-BGP session to all other sites to exchange route information for the Layer 2 VPN.
D.
It maintains an MP-BGP session to all other sites to exchange route information for the Layer 2 VPN.
Answers
E.
It maintains all MPLS LSPs between the sites.
E.
It maintains all MPLS LSPs between the sites.
Answers
Suggested answer: B, E

You are working on a multi-Data Center interconnect (DCI) solution. Your WAN is based upon a multipoint MPLS Layer 3 VPN. This design must provide Layer 2 connectivity between the data centers across your WAN.

Which technology would satisfy the requirement?

A.
VRRP
A.
VRRP
Answers
B.
VCF
B.
VCF
Answers
C.
RTG
C.
RTG
Answers
D.
EVPN
D.
EVPN
Answers
Suggested answer: D
Total 65 questions
Go to page: of 7