Juniper JN0-1362 Certification Exam Sample Questions and Answers

JNCDS Service Provider Dumps, JN0-1362 Dumps, Juniper JNCDS-SP PDF, JN0-1362 PDF, JNCDS Service Provider VCE, Juniper JNCDS Service Provider Questions PDF, Juniper Exam VCE, Juniper JN0-1362 VCE, JNCDS Service Provider Cheat SheetBefore you write the Juniper JNCDS Service Provider (JN0-1362) certification exam, you may have certain doubts in your mind regarding the pattern of the test, the types of questions asked in it, the difficulty level of the questions and time required to complete the questions. These Juniper Networks Certified Specialist Service Provider Design (JNCDS-SP) sample questions and demo exam help you in removing these doubts and prepare you to take the test.

The best approach to pass your Juniper JN0-1362 exam is to challenge and improve your knowledge. To test your learning and identify improvement areas with actual exam format, we suggest you practice with Premium Juniper JN0-1362 Certification Practice Exam. The practice test is one of the most important elements of your Juniper Service Provider Design, Specialist (JNCDS-SP) exam study strategy to discover your strengths and weaknesses, to improve your time management skills and to get an idea of the score you can expect.

Juniper JN0-1362 (JNCDS-SP) Sample Questions:

01. A customer wants to use the Internet to connect to a large number of remote sites. They want a solution that is easy to use and one that provides secure connectivity.
Which technology will meet these requirements?
a) Auto Discovery VPN (ADVPN)
b) Link Layer Discovery Protocol (LLDP)
c) equal-cost multipath (ECMP)
d) generic routing encapsulation (GRE)
02. You are asked to create a point-to-multipoint DCI that does not overwhelm the data plane with MAC learning traffic. Which protocol would you use in this situation?
a) pseudowire
03. According to Juniper Networks, which two statements describe OoB network design best practices?
(Choose two.)
a) Ensure that the management network uses a unique IP network.
b) Ensure that the management network is accessible through the production network.
c) Ensure that only console ports are used to manage devices.
d) Ensure that all users are authenticated using individual accounts and credentials.
04. Which Juniper Networks platform automates the orchestration of compute, storage, and networking resources to create and manipulate OpenStack clouds?
a) RingMaster
c) Contrail
d) NorthStar
05. MPLS services are being delivered from provider edge (PE) routers Each PE is connected to multiple customer edge (CE) routers. What should you use on the PE to isolate customer routes?
a) VPN routing and forwarding tables
b) port access control lists
c) access control lists
d) external BGP
06. What are two considerations for all WAN designs that use best industry practices?
(Choose two)
a) to provide ease of deployment
b) to provide scalability
c) to provide a dynamic routing protocol internally in the LAN
d) to provide VXLAN and EVPN solutions
07. Since deploying VPLS, you notice an unusually high level of traffic In your nine topology. On further inspection, you determine that broadcast traffic is causing the problem. The traffic is legitimate.
Nevertheless, you are asked to look into options that allow the network to scale. In this scenario, what would you do to solve the problem?
a) Add a broadcast policer and an unknown unicast policer to each VPLS.
b) Move from LDP-signaled VPLS to BGP-signaled VPLS.
c) Mark broadcast traffic with a high drop priority.
d) Deploy P2MP LSPs.
08. A customer reports a network outage at a branch office after users have reported intermittent Internet connectivity Upon further investigation, you determine that there is significant packet loss and that the majority of traffic on the WAN consists of DNS responses from many different sources. 
In this scenario, which design consideration would reduce further occurrences with minimal chance of affecting valid traffic?
a) Implement CGNAT.
b) Create a firewall filter to drop all traffic based on the source addresses of the attack.
c) Configure BGP flowspec.
d) Create a firewall filter to drop all traffic to the affected destination address of the attack.
09. The operations team reports that the network is now so large that it has become a challenge to manually create and maintain RSVP LSPs.
You want to provide the team with the capability to create LSPs using a graphical interface. Which system should you use in this scenario?
a) CSO
b) Junos Space
c) OpenFlow
d) Paragon Pathfinder
10. In your class-of-services design, you are using a multified classifier on your WAN edge devices to ensure that traffic is properly classified entering your network.
You are asked to ensure that all packets traversing your core will be handled in the same manner without using firewall filters.
Given this scenario, which statement is correct?
a) You should use forwarding classes to property mark all DiffServ values because traffic is entering your core devices.
b) You should use rewrite rules to properly mark all DiffServ values because traffic is entering your core devices from your edge
c) You should use a scheduler on all core devices to property classify incoming traffic to ensure it is handled the same.
d) You should use a behavior aggregate (BA) classifier on all core devices to ensure incoming traffic is handled the same.


Question: 01

Answer: d

Question: 02

Answer: c

Question: 03

Answer: a, c

Question: 04

Answer: c

Question: 05

Answer: a

Question: 06

Answer: a, b

Question: 07

Answer: d

Question: 08

Answer: a

Question: 09

Answer: b

Question: 10

Answer: d

Note: If you find any error in these Juniper Service Provider Design, Specialist (JNCDS-SP) sample questions, you can update us by write an email on

Rating: 5 / 5 (80 votes)