New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Juniper JN0-1362 Service Provider Design Specialist (JNCDS-SP) Exam Practice Test

Demo: 9 questions
Total 65 questions

Service Provider Design Specialist (JNCDS-SP) Questions and Answers

Question 1

You are creating a WAN solution design for an enterprise customer. The customer will be connecting three sites in different locations. The customer wants all of the sites to be part of the same Layer 2 network.

In this scenario, what are two valid connection methods that you would provide in your design? (Choose two.)

Options:

A.

Internet WAN

B.

Layer 3 VPN

C.

Layer 2 VPN

D.

VPLS

Question 2

Which statement is correct about learning remote host MAC addresses when your DCI is based on EVPN?

Options:

A.

No MAC learning by the provider edge (PE) device is performed

B.

Static MAC configuration on the provider edge (PE) device is perform

C.

Data plane MAC learning by the provider edge (PE) device is performed.

D.

Control plane MAC learning by the provider edge (PE) device

Question 3

Your company's automation team is testing a controller-based solution for dynamic LSP management They do not want the topology acquisition process to allow the controller to become a transit node of the core network's.

Which solution would fulfill the requirements?

Options:

A.

BGP-LS

B.

PCCD

C.

PCEP

D.

BGP-LU

Question 4

What are two risks when using a source-based RTBH solution? (ChooseTWO)

Options:

A.

The attacker address could be a CGNAT address resulting in a larger service outage for users.

B.

The target of the attack may not support RTBH.

C.

The attacker's address could be unknown.

D.

The target of an attack would be blocked resulting in a target being offline.

Question 5

What are two benefits of including analytics in your network management design proposal? (Choose two.)

Options:

A.

Analytics can be used for troubleshooting and diagnosing network problems

B.

Analytics dynamically standardizes software and firmware versions.

C.

Analytics can allow administrators to evaluate and optimize WAN resources.

D.

Analytics dynamically makes network optimization change

Question 6

You are asked to provide a design proposal for a service provider’s core network. The network consists of both IPv4 and IPv6 addresses and must scale up to 50 core routing devices.

In this scenario, which statement is correct regarding the IGP design?

Options:

A.

You can use OSPFv2 for IPv4 and OSPFv3 for IPv6 at the same time.

B.

You must use OSPFv3 to support both address families.

C.

You can use OSPFv2 to support both address families.

D.

You must use IS-4S to support both address families.

Question 7

You are responding to an ERFP for a customer’s MX-based BNG deployment that must accommodate at least 8000 subscribers. However, the customer’s aggregation device only support 4094 VLANs.

Which action would you propose to solve the customer's capacity concern?

Options:

A.

Use VLAN translation

B.

Use stacked VLANs

C.

Add an additional fabric module.

D.

Add an additional line card.

Question 8

A customer requests that you design their Layer 3 VPN solution so that all site-to-site traffic goes through a central site, in a hub-and-spoke fashion You must choose between using one or two interfaces on the hub WAN link.

In this scenario, which solution would you use?

Options:

A.

Use two interfaces on the hub WAN link to allow traffic to go from the spokes to the hub on one interface and from the hub to the spokes on the other interface.

B.

Use two interfaces on the hub WAN link to reserve one interface for higher Priority traffic.

C.

Use one interface on the hub WAN link, since both hub and spoke sites will require a second VRF for route-leaking purposes.

D.

Use one interface on the hub WAN link to ensure simplicity, since only a single route target is required across the entire Layer 3 VPN.

Question 9

You are deploying new WAN services between two routers and you are required to encrypt all traffic at Layer 2

Which solution would satisfy this requirement?

Options:

A.

802.1X

B.

MACsec

C.

IPsec

D.

RADIUS

Demo: 9 questions
Total 65 questions