You are asked to create a point-to-multipoint DCI that does not overwhelm the data plane with MAC learning traffic.
Which protocol would you use in this situation?
A . VPLS
B . PPTP
C . EVPN
D . pseudowire
Answer: A
You are asked to create a point-to-multipoint DCI that does not overwhelm the data plane with MAC learning traffic.
Which protocol would you use in this situation?
A . VPLS
B . PPTP
C . EVPN
D . pseudowire
Answer: A
What are two network management benefits of using devices in your design proposals?
A . Virtualization allows network administrators to dynamically make configuration changes to all network devices.
B . Virtualization can lower costs because there are fewer physical devices that need to be purchased and managed.
C . Virtualization can increase the available network bandwidth because their interface speeds are only limited by the host device.
D . Virtualization allows network administrators to dynamically add and remove services beingprovided
Answer: B,D
Your organization expenenced a man-in-the-middle attack and must protect against future attacks.
In this scenario, what must you do to protect your network?
A . Implement EVPN
B . Implement MACsec.
C . Implement destination-based RTBH
D . Implement flowspec
Answer: C
What are two high availability solution for routers with a single Routing Engine? (Choose two.)
A . VRRP
B . Non-stop active routing
C . Graceful restart
D . GRES
Answer: BC
Explanation:
https://www.juniper.net/documentation/us/en/software/junos/high-availability/topics/concept/high-availability-features-in-junos-introducing.html
Your customer’s enterprise is adding geographically dispersed branch offices and requires newWAN connections. The primary design consideration for this expansion is low cost.
Which type of WAN connection satisfies the customer’s requirement in this scenario?
A . leased line dedicated circuit
B . Internet connection with IPsec
C . transparent Layer 2 service
D . MPLS Layer 3 VPN
Answer: D
You are developing a CoS policy for a service provider core network that In this scenario, which three statements are correct? (Choose three.)
A . Core routers should use a common set of per-hop behaviors.
B . Core routers should use shapers to ensure that customer traffic does not exceed allowed bandwidth.
C . Core routers should use policers to ensure that customer traffic does not exceed allowed bandwidth.
D . Core routers should use a consistent CoS configuration across the network.
E . Core routers should use the DSCP markings already set on ingress traffic.
Answer: A, D ,E
Click the Exhibit button:
Referring to the exhibit, which mechanism is used to advertise routes from the enterprise network to the service provider network?
A . BGP flowspec
B . BGP export policies
C . BGP import policies
D . firewall filters
Answer: C
You are designing a new service provider network and need to select a label distribution mechanism that guides certain types of traffic along specific paths within the network.
Which two label distribution mechanisms would satisfy the requirements? (Choose two.)
A . RSVP
B . segment routing
C . LDP
D . BGP-LU
Answer: A,C
As a service provider network engineer, you are asked by management design a Layer 2 VPN product with a ‘’five nines’’ SLA.
Which mechanism will address this requirement?
A. VRRP
B. EVPN LAG
C. GRES
D. SyncE
Answer: B
The operations team reports that the network is now so large that it has become a challenge to manually create and maintain RSVP LSPs. You want to provide the team with the capability to create LSPs using a graphical interface.
Which system should you use in this scenario?
A . OpenFlow
B . Paragon Pathfinder
C . Junos Space
D . CSO
Answer: C