Juniper JN0-1362 Practice Test - Questions Answers, Page 4
List of questions
Related questions
You are designing a new deployment of Paragon Pathfinder (formerly known as NorthStar). You are asked to ensure that LSPs can be created only from Paragon Pathfinder itself.
What will accomplish this task?
Your organization expenenced a man-in-the-middle attack and must protect against future attacks.
In this scenario, what must you do to protect your network?
You are responding to an ERFP for a customer's MX-based BNG deployment that must accommodate at least 8000 subscribers. However, the customer's aggregation device only support 4094 VLANs.
Which action would you propose to solve the customer's capacity concern?
What are two considerations for using the public Internet for WAN connectivity? (Choose two.)
You are designing a solution for a company with a central office with several branch locations geographically dispersed. You are given the following requirements:
— provides a different bandwidth at each location,
— has any-to-any connectivity,
— offloads some network responsibility.
— is inherently isolated.
— has a simple network design.
Which statement satisfies these requirements?
You are designing a Metro Ethernet ring topology that requires a sub 50 ms failover.
Which two protocols will meet this requirement? (Choose two )
You are asked to design a WAN for a large enterprise. Each site must have multiple connections for redundancy. MPLS is not available at every site but it is preferred where available.
Which topology satisfies these design requirements?
Which two network availability features require a router to have two Routing Engines installed?
(Choose two.)
Which two statements are correct about Junos Space Connectivity Services Director? (Choose two)
You are asked to provide a design proposal for a services provider's core network. The network consists of both IPv2 and IPv4 addresses and must scale up to 50 core routing devices. As part of your design, you must in redundancy and ensure that future network expansion is easily incorporated.
In this scenario, which statement is correct regarding the BGP design?
Question