In this scenario which two statements are correct?
You are asked to design a DDoS prevention system to help mitigate denial-of-service attacks that target your customers. The management group wants to know the effect FlowSpec may have on current network operations if it is implemented as a solution. In this scenario which two statements are correct? (Choose two...
Referring to the exhibit which type of IPsec VPN should be used to create the desired topology?
Exhibit. Referring to the exhibit which type of IPsec VPN should be used to create the desired topology?A . AutoVPNB . fully meshed VPNC . Group VPND . hub-and-spoke VPNView AnswerAnswer: C
What are three components of a class-of-service scheduler? (Choose three.)
What are three components of a class-of-service scheduler? (Choose three.)A . transmit rateB . forwarding classC . queue priorityD . delay buffer sizeE . policing rateView AnswerAnswer: A, C, D Explanation: Junos OS schedulers allow you to define the priority, bandwidth, delay buffer size, rate control status, and RED drop...
Which Juniper Networks platform automates the orchestration of compute, storage, and networking resources to create and manipulate OpenStack clouds?
Which Juniper Networks platform automates the orchestration of compute, storage, and networking resources to create and manipulate OpenStack clouds?A . NorthStarB . ContrailC . WANDLD . RingMasterView AnswerAnswer: B
Which two actions provide out-of-band management to your edge routers?
Your WAN links are on a VPLS service from a single service provider. You must verify device configuration power and status in the event of a service outage. Which two actions provide out-of-band management to your edge routers? (Choose two)A . Place management traffic on a separate VLAN on the...
Which security implementation does Juniper Networks recommend for all core routers in a service provider network?
Which security implementation does Juniper Networks recommend for all core routers in a service provider network?A . intrusion and detection preventionB . unified threat managementC . application firewallD . stateless loopback firewall filterView AnswerAnswer: D
Which two statements are true in this scenario?
Your company is designing a new data center in a remote location that must be connected to your local data center. You have a service provider connection between the CE devices at each site. You want to implement EVPN with VXLAN services between sites, but the service provider does not...
Which action meets the customer's requirement?
Your customer's WAN edge connects to two service providers SP-A and SP-B. The customer is advertising a single /22 subnet to both service providers through EBGP peering sessions. The customer wants to influence inbound traffic to the advertised /22 destination prefix so that it passes through SP-A when both paths...
Which action will satisfy this requirement?
Your customer is paying for traffic prioritization and you must ensure that all traffic from their 172.27. 10.0/24 network receives top priority through your network. Which action will satisfy this requirement?A . Apply a behavior aggregate classifier to the egress interface.B . Apply a custom rewrite rule to the ingress...
Which Layer 2 data center interconnect model satisfies this requirement?
Your organization maintains container-based applications hosted by two different cloud service providers. You are asked to design a Layer 2 connection between the two cloud data centers. The data center interconnect solution must support control plane MAC learning. Which Layer 2 data center interconnect model satisfies this requirement?A . L3VPNB...