Free JN0-1361 Exam Braindumps (page: 6)

Page 5 of 17

Your customer wants to use NorthStar to communicate with network devices and acquire the MPLS topology. Which protocol is recommended for this purpose?

  1. PIM-SSM
  2. OSPF
  3. BGP-LS
  4. ISIS

Answer(s): C



You are asked to design a DDoS prevention system to help mitigate denial-of-service attacks that target your customers. The management group wants to know the effect FlowSpec may have on current network operations if it is implemented as a solution. In this scenario which two statements are correct? (Choose two )

  1. FlowSpec can block traffic based on stateful flow information.
  2. FlowSpec can block traffic based on the source address.
  3. FlowSpec requires Jflow implementation and licensing.
  4. FlowSpec can block traffic based on the destination address.

Answer(s): B,D



Exhibit:



Referring to the exhibit which type of IPsec VPN should be used to create the desired topology?

  1. AutoVPN
  2. fully meshed VPN
  3. Group VPN
  4. hub-and-spoke VPN

Answer(s): C



Your organization maintains container-based applications hosted by two different cloud service providers. You are asked to design a Layer 2 connection between the two cloud data centers. The data center interconnect solution must support control plane MAC learning. Which Layer 2 data center interconnect model satisfies this requirement?

  1. L3VPN
  2. L2VPN
  3. VPLS
  4. EVPN

Answer(s): D






Post your Comments and Discuss Juniper JN0-1361 exam with other Community members:

JN0-1361 Discussions & Posts