ExamGecko
Home Home / Juniper / JN0-1362

Juniper JN0-1362 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











You are designing a new deployment of Paragon Pathfinder (formerly known as NorthStar). You are asked to ensure that LSPs can be created only from Paragon Pathfinder itself.

What will accomplish this task?

A.
PCC initiated
A.
PCC initiated
Answers
B.
PCC delegated
B.
PCC delegated
Answers
C.
PCE delegated
C.
PCE delegated
Answers
D.
PCE initiated
D.
PCE initiated
Answers
Suggested answer: C

Your organization expenenced a man-in-the-middle attack and must protect against future attacks.

In this scenario, what must you do to protect your network?

A.
Implement EVPN
A.
Implement EVPN
Answers
B.
Implement MACsec.
B.
Implement MACsec.
Answers
C.
Implement destination-based RTBH
C.
Implement destination-based RTBH
Answers
D.
Implement flowspec
D.
Implement flowspec
Answers
Suggested answer: A

You are responding to an ERFP for a customer's MX-based BNG deployment that must accommodate at least 8000 subscribers. However, the customer's aggregation device only support 4094 VLANs.

Which action would you propose to solve the customer's capacity concern?

A.
Use VLAN translation
A.
Use VLAN translation
Answers
B.
Use stacked VLANs
B.
Use stacked VLANs
Answers
C.
Add an additional fabric module.
C.
Add an additional fabric module.
Answers
D.
Add an additional line card.
D.
Add an additional line card.
Answers
Suggested answer: D

What are two considerations for using the public Internet for WAN connectivity? (Choose two.)

A.
End-to-end traffic is best effort.
A.
End-to-end traffic is best effort.
Answers
B.
It is inherently insecure, and additional encryption should be considered.
B.
It is inherently insecure, and additional encryption should be considered.
Answers
C.
End-to-end CoS and larger MTU are possible.
C.
End-to-end CoS and larger MTU are possible.
Answers
D.
It is inherently secure and does not require additional encryption.
D.
It is inherently secure and does not require additional encryption.
Answers
Suggested answer: B, C

You are designing a solution for a company with a central office with several branch locations geographically dispersed. You are given the following requirements:

— provides a different bandwidth at each location,

— has any-to-any connectivity,

— offloads some network responsibility.

— is inherently isolated.

— has a simple network design.

Which statement satisfies these requirements?

A.
Implement WAN over the public Internet.
A.
Implement WAN over the public Internet.
Answers
B.
Implement Layer 3 VPN services at each location
B.
Implement Layer 3 VPN services at each location
Answers
C.
Implement Layer 2 VPN point-to-point circuits from each location to the central office.
C.
Implement Layer 2 VPN point-to-point circuits from each location to the central office.
Answers
D.
Implement services on a mesh of dark fiber between each location
D.
Implement services on a mesh of dark fiber between each location
Answers
Suggested answer: C

You are designing a Metro Ethernet ring topology that requires a sub 50 ms failover.

Which two protocols will meet this requirement? (Choose two )

A.
Spanning Tree Protocol
A.
Spanning Tree Protocol
Answers
B.
Link Aggregation Control Protocol
B.
Link Aggregation Control Protocol
Answers
C.
MPLS fast reroute
C.
MPLS fast reroute
Answers
D.
Ethernet ring protection switching
D.
Ethernet ring protection switching
Answers
Suggested answer: A, D

You are asked to design a WAN for a large enterprise. Each site must have multiple connections for redundancy. MPLS is not available at every site but it is preferred where available.

Which topology satisfies these design requirements?

A.
hub-and-spoke Internet WAN
A.
hub-and-spoke Internet WAN
Answers
B.
full mesh SD-WAN
B.
full mesh SD-WAN
Answers
C.
full mesh MPLS VPN
C.
full mesh MPLS VPN
Answers
D.
hub-and-spoke SD-WAN
D.
hub-and-spoke SD-WAN
Answers
Suggested answer: D

Which two network availability features require a router to have two Routing Engines installed?

(Choose two.)

A.
JVRRP
A.
JVRRP
Answers
B.
GRES
B.
GRES
Answers
C.
nonstop routing
C.
nonstop routing
Answers
D.
graceful restart
D.
graceful restart
Answers
Suggested answer: A, C

Which two statements are correct about Junos Space Connectivity Services Director? (Choose two)

A.
It is used to design, provision, and monitor Label Discovery Protocol (LDP) and Border Gateway Protocol (BGP) services on devices
A.
It is used to design, provision, and monitor Label Discovery Protocol (LDP) and Border Gateway Protocol (BGP) services on devices
Answers
B.
It is used to design and simulate MPLS-TE and LSP routing.
B.
It is used to design and simulate MPLS-TE and LSP routing.
Answers
C.
It is used to design, provision, and deploy MPLS-dynamic, RSVP-signaled LSP, and static LSP services on devices.
C.
It is used to design, provision, and deploy MPLS-dynamic, RSVP-signaled LSP, and static LSP services on devices.
Answers
D.
It is used to provide zero touch provisioning (ZTP), which simplifies the deployment of networks by providing policy-driven plug-and-play provisioning and network bring-up operations.
D.
It is used to provide zero touch provisioning (ZTP), which simplifies the deployment of networks by providing policy-driven plug-and-play provisioning and network bring-up operations.
Answers
Suggested answer: C, D

You are asked to provide a design proposal for a services provider's core network. The network consists of both IPv2 and IPv4 addresses and must scale up to 50 core routing devices. As part of your design, you must in redundancy and ensure that future network expansion is easily incorporated.

In this scenario, which statement is correct regarding the BGP design?

A.
You should create a full mesh of EBGP neighbors in your core.
A.
You should create a full mesh of EBGP neighbors in your core.
Answers
B.
You must use direct interface peering for your neighbors.
B.
You must use direct interface peering for your neighbors.
Answers
C.
You should use a pair of route reflectors with peering's to all other core devices.
C.
You should use a pair of route reflectors with peering's to all other core devices.
Answers
D.
You must separate the BGP network into multiple autonomous systems on geographic location.
D.
You must separate the BGP network into multiple autonomous systems on geographic location.
Answers
Suggested answer: C
Total 65 questions
Go to page: of 7