Which protocol would you use in this situation?
You are asked to create a point-to-multipoint DCI that does not overwhelm the data plane with MAC learning traffic. Which protocol would you use in this situation?A . VPLSB . PPTPC . EVPND . pseudowireView AnswerAnswer: A
What are two network management benefits of using devices in your design proposals?
What are two network management benefits of using devices in your design proposals?A . Virtualization allows network administrators to dynamically make configuration changes to all network devices.B . Virtualization can lower costs because there are fewer physical devices that need to be purchased and managed.C . Virtualization can increase the...
In this scenario, what must you do to protect your network?
Your organization expenenced a man-in-the-middle attack and must protect against future attacks. In this scenario, what must you do to protect your network?A . Implement EVPNB . Implement MACsec.C . Implement destination-based RTBHD . Implement flowspecView AnswerAnswer: C
What are two high availability solution for routers with a single Routing Engine? (Choose two.)
What are two high availability solution for routers with a single Routing Engine? (Choose two.)A . VRRPB . Non-stop active routingC . Graceful restartD . GRESView AnswerAnswer: BC Explanation: https://www.juniper.net/documentation/us/en/software/junos/high-availability/topics/concept/high-availability-features-in-junos-introducing.html
Which type of WAN connection satisfies the customer's requirement in this scenario?
Your customer’s enterprise is adding geographically dispersed branch offices and requires newWAN connections. The primary design consideration for this expansion is low cost. Which type of WAN connection satisfies the customer's requirement in this scenario?A . leased line dedicated circuitB . Internet connection with IPsecC . transparent Layer 2 serviceD...
You are developing a CoS policy for a service provider core network that In this scenario, which three statements are correct? (Choose three.)
You are developing a CoS policy for a service provider core network that In this scenario, which three statements are correct? (Choose three.)A . Core routers should use a common set of per-hop behaviors.B . Core routers should use shapers to ensure that customer traffic does not exceed allowed bandwidth.C...
Referring to the exhibit, which mechanism is used to advertise routes from the enterprise network to the service provider network?
Click the Exhibit button: Referring to the exhibit, which mechanism is used to advertise routes from the enterprise network to the service provider network?A . BGP flowspecB . BGP export policiesC . BGP import policiesD . firewall filtersView AnswerAnswer: C
Which two label distribution mechanisms would satisfy the requirements?
You are designing a new service provider network and need to select a label distribution mechanism that guides certain types of traffic along specific paths within the network. Which two label distribution mechanisms would satisfy the requirements? (Choose two.)A . RSVPB . segment routingC . LDPD . BGP-LUView AnswerAnswer: A,C
Which mechanism will address this requirement?
As a service provider network engineer, you are asked by management design a Layer 2 VPN product with a ‘’five nines’’ SLA. Which mechanism will address this requirement? A. VRRP B. EVPN LAG C. GRES D. SyncEView AnswerAnswer: B
Which system should you use in this scenario?
The operations team reports that the network is now so large that it has become a challenge to manually create and maintain RSVP LSPs. You want to provide the team with the capability to create LSPs using a graphical interface. Which system should you use in this scenario?A . OpenFlowB...