ExamGecko
Home Home / Juniper / JN0-1362

Juniper JN0-1362 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











You are designing a new service provider network and need to select a label distribution mechanism that guides certain types of traffic along specific paths within the network.

Which two label distribution mechanisms would satisfy the requirements? (Choose two.)

A.
RSVP
A.
RSVP
Answers
B.
segment routing
B.
segment routing
Answers
C.
LDP
C.
LDP
Answers
D.
BGP-LU
D.
BGP-LU
Answers
Suggested answer: A, C

You are preparing to purchase WAN services from a service provider You are required to protect all Layer 2 and higher traffic from injection wiretapping, man-in-the-middle, and playback type attacks.

Which solution would satisfy this requirement?

A.
Use Layer 3 VPN services from the service provider
A.
Use Layer 3 VPN services from the service provider
Answers
B.
Use IPsec between locations.
B.
Use IPsec between locations.
Answers
C.
Use Layer 2 VPN services from the service provider.
C.
Use Layer 2 VPN services from the service provider.
Answers
D.
Use MACsec between locations.
D.
Use MACsec between locations.
Answers
Suggested answer: B

Exhibit.

Referring to the exhibit considering shared fates, which Internet Transit?

A.
Customer A
A.
Customer A
Answers
B.
Customer C
B.
Customer C
Answers
C.
Customer B
C.
Customer B
Answers
D.
Customer D
D.
Customer D
Answers
Suggested answer: C

Exhibit.

You want to design a VPN service that will allow your enterprise the ability to span their VLANs between the four sites shown in the exhibit, while allowing point-to-multipoint connectivity.

Which two MPLS VPN technologies allow this type of functionality (Choose two.)

A.
EVPN
A.
EVPN
Answers
B.
Layer 2 VPN
B.
Layer 2 VPN
Answers
C.
VPLS
C.
VPLS
Answers
D.
Layer 3 VPN
D.
Layer 3 VPN
Answers
Suggested answer: A, D

You belong to an organization consisting of multiple sites. Your topology is constantly changing. You need a method of encrypting traffic between sites.

Which technology enables you to add new sites without reconfiguring existing sites?

A.
IPsec Auto VPN with ADVPN
A.
IPsec Auto VPN with ADVPN
Answers
B.
mesh IPsec overlay VPN
B.
mesh IPsec overlay VPN
Answers
C.
point-to-point IPsec VPN
C.
point-to-point IPsec VPN
Answers
D.
hub-and-spoke IPsec VPN
D.
hub-and-spoke IPsec VPN
Answers
Suggested answer: C

In your class-of-services design, you are using a multified classifier on your WAN edge devices to ensure that traffic is properly classified entering your network. You are asked to ensure that all packets traversing your core will be handled in the same manner without using firewall filters.

Given this scenario, which statement is correct?

A.
You should use forwarding classes to property mark all DiffServ values because traffic is entering your core devices.
A.
You should use forwarding classes to property mark all DiffServ values because traffic is entering your core devices.
Answers
B.
You should use rewrite rules to properly mark all DiffServ values because traffic is entering your core devices from your edge
B.
You should use rewrite rules to properly mark all DiffServ values because traffic is entering your core devices from your edge
Answers
C.
You should use a scheduler on all core devices to property classify incoming traffic to ensure it is handled the same.
C.
You should use a scheduler on all core devices to property classify incoming traffic to ensure it is handled the same.
Answers
D.
You should use a behavior aggregate (BA) classifier on all core devices to ensure incoming traffic is handled the same.
D.
You should use a behavior aggregate (BA) classifier on all core devices to ensure incoming traffic is handled the same.
Answers
Suggested answer: D

A customer wants to use the Internet to connect to a large number of remote sites. They want a solution that is easy to use and one that provides secure connectivity.

Which technology will meet these requirements?

A.
generic routing encapsulation (GRE)
A.
generic routing encapsulation (GRE)
Answers
B.
equal-cost multipath (ECMP)
B.
equal-cost multipath (ECMP)
Answers
C.
Link Layer Discovery Protocol (LLDP)
C.
Link Layer Discovery Protocol (LLDP)
Answers
D.
Auto Discovery VPN (ADVPN)
D.
Auto Discovery VPN (ADVPN)
Answers
Suggested answer: A

You are receiving the same routes from two different equal-cost EBGP peers. Instead of choosing one single best path, you want to design your network to accept both routes and load-balance between them.

Which BGP concept would you use to facilitate this request?

A.
next-hop self
A.
next-hop self
Answers
B.
multi-hop
B.
multi-hop
Answers
C.
addpath
C.
addpath
Answers
D.
multipath
D.
multipath
Answers
Suggested answer: D

Your customer wants to enable their MX Series core so that a controller can dynamically manage their LSPs.

Which protocol provides this capability?

A.
BGP-LU
A.
BGP-LU
Answers
B.
PCEP
B.
PCEP
Answers
C.
PCRF
C.
PCRF
Answers
D.
BGP-LS
D.
BGP-LS
Answers
Suggested answer: B

What are two ways to provider redundancy in a WAN design to address physical failures? (Choose two.)

A.
Select products that use MC-LAG.
A.
Select products that use MC-LAG.
Answers
B.
Select products with different types of MICs.
B.
Select products with different types of MICs.
Answers
C.
Select products that use multiple Routing Engines.
C.
Select products that use multiple Routing Engines.
Answers
D.
Select products with different versions of firmware.
D.
Select products with different versions of firmware.
Answers
Suggested answer: B, D
Total 65 questions
Go to page: of 7