Exhibit:
You work for service provider B that wants to implement a hot potato routing policy on the network so that router C uses link C-A to reach service provider A's advertised routes and router D uses link D- B to reach Service Provider A's advertised routes Currently traffic from router C is traversing the core to exit the network on router B . Referring to the exhibit, what are two design actions that would satisfy the requirements? (Choose two.)
A. Implement BGP-ORR
B. Configure new IBGP neighbors between routers C and A and routers D and B
C. Implement BGP-LS
D. Configure the route reflector to send multiple copies of a route learned from different IBGP peers to its clients.
You are designing a service provider core network As part of the design, you must ensure that the MPLS
network utilizes the traffic engineering database (TED) for path selection and resiliency. You have chosen
OSPF as the IGP for your design.
In this scenario which statement is correct?
A. You must enable traffic engineering in OSPF to populate the TED.
B. OSPF cannot be used to populate the TED.
C. You must disable traffic engineering in OSPF to use the TED.
D. OSPF populates the TED by default.
You are designing a multi-site data center environment with data center interconnects between sites. Which two statements are true in this scenario? (Choose two. )
A. VPLS can be used to interconnect the multiple sites.
B. EVPN with VXLAN can be used to interconnect the multiple sites.
C. The data centers must be connected with a full mesh design.
D. All data centers must be in the same Layer 2 broadcast domain and subnet.
Your customer wants an MPLS-based L3VPN service between multiple remote locations. Which two statements are true regarding the customer's WAN edge devices? (Choose two )
A. They must have EBGP configured.
B. They require routes for all remote sites.
C. They must have MPLS configured.
D. They require IP connectivity with the PEs.
Exhibit: Referring to the exhibit which type of IPsec VPN should be used to create the desired topology?
A. AutoVPN
B. fully meshed VPN
C. Group VPN
D. hub-and-spoke VPN
Which statement is correct regarding classifiers in CoS?
A. Classifiers are used to route traffic between routing instances.
B. Classifiers are used to define the transmit rate for forwarding classes.
C. Classifiers are used to separate traffic into different forwarding classes.
D. Classifiers are used to change DiffServ values on outgoing packets.
You are creating an MPLS design proposal for a customer that requires traffic engineering features through their core MPLS network. The customer has edge routers that only support LDP signaling. Which two features would you propose using in this scenario? (Choose two)
A. RSVP tunneling
B. LDP
C. RSVP
D. LDP tunneling
Your customer's WAN edge connects to two service providers SP-A and SP-B. The customer is advertising a single /22 subnet to both service providers through EBGP peering sessions. The customer wants to influence inbound traffic to the advertised /22 destination prefix so that it passes through SP-A when both paths are operational. Which action meets the customer's requirement?
A. Advertise the prefix to SP-B with a higher local preference.
B. Advertise the prefix to SP-A with a higher local preference.
C. Prepend your AS number multiple times on the prefix advertised to SPA.
D. Prepend your AS number multiple times on the prefix advertised to SP-B.
You are designing an EVPN data center solution with VXLAN. Which two statements are true in this scenario? (Choose two )
A. The original MAC address is prepended to a VXLAN VNI.
B. The original MAC address is replaced by a VXLAN VNI.
C. The original MAC address is encapsulated within the VXLAN frame.
D. The original MAC address is advertised to remote PEs.
You are designing a new SDN WAN solution for a large enterprise MPLS backbone. The existing customer network has some LSPs in place that were manually provisioned. The customer requires that the solution provide for complete LSP life cycle management. You are considering the NorthStar Controller as pan of the design. Which two LSP types would be managed in this scenario? (Choose two )
A. PCC administered
B. PCE administered
C. PCE controlled
D. PCE delegated
You are implementing an MPLS-based WAN environment to connect remote sites to the corporate
headquarters (HQ) However, the service provider at the HQ location does not provide service at the
location of one of the remote sites.
Which statement is true in this scenario?
A. A dedicated leased line will need to be used to connect to the remote site.
B. A circuit can be bridged across multiple service providers for end-to-end connectivity.
C. A public WAN circuit can be provisioned over the Internet that will provide the same level of service.
D. A hub site in a location where both service providers have a presence will need to be deployed.
Your customer connects to their service providers using fiber-based Ethernet connections in a shared
collocation room. The customer has expressed concerns about wire tapping and man-in-the-middle
attacks, and has asked for your design recommendation to minimize such attacks.
Which service addresses the customer's concern?
A. 802 1x
B. MACsec
C. BGPFIowSpec
D. 802 3ad
What is the minimum number of nodes in a Junos Space Fabric design?
A. 2
B. 3
C. 5
D. 1
Exhibit:
Referring to the exhibit, which two methods would be used by the designer of ISP E to ensure that traffic
between ISP C and ISP A will traverse through ISP B? (Choose two.)
A. Apply the BGP import policy (to EBGP peers) on R4 anaVor R5 to adjust the local preference on the ISP C routes so that the path through ISP B is more preferred
B. Apply the BGP export policy (to IBGP peers) on R4 and R5 to adjust the MED on the ISP C routes so that the path through ISP D is less preferred.
C. Apply the BGP import policy (to EBGP peers) on R4 and R5 to modify the AS PATH attribute so that the path through ISP D is less preferred.
D. Apply the BGP import policy (to EBGP peers) on R4 to adjust the ORIGIN for the routes received from ISP B to unknown.
Your customer is deploying a data center with redundant connections for WAN services through ISP-1 and ISP-2. Your customer has decided to deploy an active/passive Internet connection uplink model and pay-per-use for a passive connection associated with ISP-2. The customer wants to ensure limited use of the connection through ISP-2. Which two actions would you perform to meet the objective? (Choose two )
A. Extend the AS Path length on the prefix advertised to ISP-1 to influence ingress traffic to enter through ISP-1.
B. Use MED and Origin to direct northbound traffic flows out ISP-1
C. Extend the AS Path length on the prefix advertised to ISP-2 to influence ingress traffic to enter through ISP-1.
D. Use Local Preference to direct northbound traffic flows out ISP-1