Free JN0-664 Exam Braindumps

Pass your Service Provider - Professional (JNCIP-SP) exam with these free Questions and Answers

Page 5 of 13
QUESTION 16

Exhibit
JN0-664 dumps exhibit
You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number Which two steps will accomplish this task? (Choose two.)

  1. A. Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
  2. B. Configure the BGP group with the as-override parameter on R2 and R3
  3. C. Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
  4. D. Configure the BGP group with the as-override parameter on R1 and R4

Correct Answer: AB
The advertise-peer-as parameter allows a router to advertise its peer’s AS number as part of the AS path attribute when sending BGP updates to other peers. This parameter is useful when two routers in the same AS need to exchange routes through another AS, such as in the case of R1 and R4. By configuring this parameter on R1 and R4, they can advertise each other’s AS number to R2 and R3, respectively.
The as-override parameter allows a router to replace the AS number of its peer with its own AS number when receiving BGP updates from that peer. This parameter is useful when two routers in different ASes need to exchange routes through another AS that has the same AS number as one of them, such as in the case of R2 and R3. By configuring this parameter on R2 and R3, they can override the AS number of R1 and R4 with their own AS number when sending BGP updates to each other.

QUESTION 17

You are asked to protect your company's customers from amplification attacks. In this scenario, what is Juniper's recommended protection method?

  1. A. ASN prepending
  2. B. BGP FlowSpec
  3. C. destination-based Remote Triggered Black Hole
  4. D. unicast Reverse Path Forwarding

Correct Answer: C
amplification attacks are a type of distributed denial-of-service (DDoS) attack that exploit the characteristics of certain protocols to amplify the traffic sent to a victim. For example, an attacker can send a small DNS query with a spoofed source IP address to a DNS server, which will reply with a much larger response to the victim. This way, the attacker can generate a large amount of traffic with minimal resources.
One of the methods to protect against amplification attacks is destination-based Remote Triggered Black Hole (RTBH) filtering. This technique allows a network operator to drop traffic destined to a specific IP address or prefix at the edge of the network, thus preventing it from reaching the victim and consuming bandwidth and resources. RTBH filtering can be implemented using BGP to propagate a special route with a next hop of 192.0.2.1 (a reserved address) to the edge routers. Any traffic matching this route will be discarded by the edge routers.

Page 5 of 13

Post your Comments and Discuss Juniper JN0-664 exam with other Community members: