Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Juniper JN0-664 Actual Questions

Page: 5 / 5
Total 72 questions

Service Provider Routing and Switching - Professional (JNCIP-SP) Questions and Answers

Question 17

Which statement is true regarding BGP FlowSpec?

Options:

A.

It uses a remote triggered black hole to protect a network from a denial-of-service attack.

B.

It uses dynamically created routing policies to protect a network from denial-of-service attacks

C.

It is used to protect a network from denial-of-service attacks dynamically

D.

It verifies that the source IP of the incoming packet has a resolvable route in the routing table

Question 18

Exhibit

You want to use both links between R1 and R2 Because of the bandwidth difference between the two links, you must ensure that the links are used as much as possible.

Which action will accomplish this goal?

Options:

A.

Define a policy to tag routes with the appropriate bandwidth community.

B.

Disable multipath.

C.

Ensure that the metric-out parameter on the Gigabit Ethernet interface is higher than the 10 Gigibit Ethernet interface.

D.

Enable per-prefix load balancing.

Question 19

Exhibit

Referring to the exhibit, a working L3VPN exists that connects VPN-A sites CoS is configured correctly to match on the MPLS EXP bits of the LSP, but when traffic is sent from Site-1 to Site-2, PE-2 is not classifying the traffic correctly

What should you do to solve the problem?

Options:

A.

Configure the explicit-null statement on PE-1.

B.

Configure the explicit-null statement on PE-2

C.

Configure VPN prefix mapping for the PE-1_to_PE-2 LSP

D.

Set a static CoS value for the PE-1_to_PE-2 LSP

Question 20

Exhibit

Referring to the exhibit, you must provide Internet access for VPN-A using CE-1 as the hub CE.

Which two statements are correct in this situation? (Choose two.)

Options:

A.

You must use RIB groups to leak routes between the inet. o and vpn-a. inet. o tables.

B.

RIB groups are not needed to leak routes between the inet. 0 and VPN—A. inet. 0 tables,

C.

Internet traffic from Site 2 takes the path of PE-2 -> PE-1 -> GW-1.

D.

Internet traffic from Site 2 takes the path of PE-2 -> PE-1 -> CE-1 -> PE-1 -> GW-1.

Page: 5 / 5
Total 72 questions