Free JN0-1362 Exam Braindumps (page: 6)

Page 5 of 17

What are two risks when using a source-based RTBH solution? (Choose TWO)

  1. The attacker address could be a CGNAT address resulting in a larger service outage for users.
  2. The target of the attack may not support RTBH.
  3. The attacker's address could be unknown.
  4. The target of an attack would be blocked resulting in a target being offline.

Answer(s): A,B



As a service provider network architect, you are working with a potential customer who wants to replace their WAN, consisting of two data centers, one HQ, and 76 branch offices Due to application latency requirements between branch offices, the customer insists that all traffic must take the most optimal path through the service provider network. The customer intends to encrypt all traffic between customer routers at each location.
Which WAN technology would you propose in this scenario?

  1. point-to-point Layer 2 VPNs
  2. Layer 3 VPN
  3. Internet as WAN
  4. H-VPLS

Answer(s): C



Which statement is correct about learning remote host MAC addresses when your DCI is based on EVPN?

  1. No MAC learning by the provider edge (PE) device is performed
  2. Static MAC configuration on the provider edge (PE) device is perform
  3. Data plane MAC learning by the provider edge (PE) device is performed.
  4. Control plane MAC learning by the provider edge (PE) device

Answer(s): C



You are designing a full mesh of connections between multiple enterprise In this scenario, which two statements are correct? (Choose two.)

  1. Security and Internet control is applied at a central location
  2. All sites are able to communicate directly with each other
  3. It is easier for administrators to enforce application-aware services with a single point of management.
  4. IPsec tunnels can be used to secure traffic between sites.

Answer(s): A,B






Post your Comments and Discuss Juniper JN0-1362 exam with other Community members:

JN0-1362 Discussions & Posts