You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites.
Which two solutions would meet the requirements? (Choose two.)
You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers.
In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)
AThe total number of devices is increased.
BThe overall network performance is increased.
CThe number of connections between devices is decreased.
DThe number of protocols used is decreased.
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.
In this scenario, which type of security design would fulfill this requirement?
Aa centralized security appliance
Ba container-based security deployment
Ca physical security device connected to each host
Dan all-in-one virtual security device in each host
Click the Exhibit button.
Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.
What should you do to accomplish this task?
AUse VRRP on Agg-1 and Agg-2.
BPlace Agg-1 and Agg-2 in a Virtual Chassis.
CUse RSTP on all devices.
DUse BGP load balancing on all devices.
Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API?
AREST Explorer
BJSNAPy
CJET
DPyEZ
Question 6
Cloud Fundamentals
0
Question 7
Cloud Infrastructure (NFV and SDN)
Question 8
Cloud Fundamentals
Question 9
Cloud Fundamentals
Question 10
Cloud Fundamentals
Question 11
Network Virtualization
Question 12
Cloud Fundamentals
Question 13
Cloud Fundamentals
Question 14
Cloud Fundamentals
Question 15
Cloud Fundamentals
Question 16
Cloud Infrastructure (NFV and SDN)
Question 17
Cloud Fundamentals
Question 18
Cloud Fundamentals
Question 19
Cloud Fundamentals
Question 20
Cloud Fundamentals
Question 21
Network Virtualization
Question 22
Cloud Fundamentals
Question 23
Cloud Fundamentals
Question 24
Cloud Fundamentals
Question 25
Network Virtualization
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
What are two phases in Juniper's lifecycle approach when designing a network? (Choose two.)
Aplan
Bbuild
Cbuy
Doversee
You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections.
Which statement is true in this situation?
AThe connection should be secured using IPsec.
BThe WAN edge devices must support MPLS.
CThe connections support Layer 2 traffic bridging.
DThe service provider can isolate traffic in a private MPLS instance.
What are two features used to enable high availability? (Choose two.)
AVRRP
Bchassis clustering
Cfull-duplex mode
DSNMP
You are evaluating an existing network to determine requirements for a network upgrade.
In this scenario, which statement is true?
AA network baseline identifies devices that do not have redundant components.
BA network baseline identifies traffic growth patterns across network devices.
CA network baseline identifies how many users are connected to the network.
DA network baseline identifies the type and level of traffic load on the network.
What are three examples of physical security? (Choose three.)
Asecurity cameras
Baccess door keypads
Ca mantrap
Dman in the middle
Eintrusion detection and prevention
Which two statements are true regarding a Virtual Chassis? (Choose two.)
AA Virtual Chassis must be configured on the same series but not the same model.
BA Virtual Chassis supports up to 10 participating devices.
CA Virtual Chassis supports only two participating devices.
DA Virtual Chassis can be configured on mixed series and models.
Which two pieces of information should be included in an RFP response? (Choose two.)
Aa list of contributing material including technical publications, training guides, and courseware used to build the proposed design
Bdesign details including information about the devices, protocols, and technologies included in the proposed design
Cconfiguration details including proposed devices, protocols, and technologies included in the proposed design
Da network topology including a high-level logical design as well as low-level physical design of the proposed network
Which two features would cause latency in a WAN connection? (Choose two.)
AIPS
Bsyslog
Ctelemetry
DUTM antivirus
What are three environmental characteristics that affect the campus network design? (Choose three.)
Atransmission media characteristics
Bdistribution of users
Clocations of wiring closets
DPC operating system
Eremote site connectivity
Why would you recommend Junos Space Security Director in a network design?
AIt simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks.
BIt provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.
CIt helps administrators to more quickly and intuitively manage all phases of a security policy life cycle.
DIt provides detection, isolation, and resolution of network faults and incidents.
What are three types of automation scripts used on a Junos device? (Choose three.)
Aop scripts
Bcommit scripts
Cboot scripts
Devent scripts
Econtrol scripts
What are three components of an RFP? (Choose three.)
Ageneral information about the existing network environment
Ba list of devices to meet the design requirements
Ca list of design requirements
Da list of available IP addresses within their current IP allocation
Ethe types of solutions that the design must include
What are two valid reasons to enable route summarization? (Choose two.)
Ato reduce routing overhead
Bto reduce the coexistence of BGP with IGPs
Cto benefit from a hierarchical IP addressing plan
Dto enable the use of more than one routing protocol
What are two requirements that every RFP response should include? (Choose two.)
Aa support plan that includes details about servicing the components once operational
Ba detailed competitor comparison document that indicates the proposed design is the least expensive option
Ca detailed forecast of exception handling after the design has been implemented and is operational
Dan implementation plan that includes a description of how the design will be implemented
What are two reasons why you would send an RFP to multiple vendors (Choose two.)
Ato eliminate vendors who cannot meet the requirements
Bto warranty the process against fraud
Cto satisfy international law requiring a minimum of three vendors
Dto compare competing proposals
You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure.
Which statement is true about the proposed solution?
AIPsec packets can be fragmented once encrypted.
BIPsec tunnels will require an MPLS infrastructure through the WAN.
CIPsec can require MTU modifications to accommodate the additional overhead.
DPackets that are passed through an IPsec tunnel are not encrypted.
Which compliance standard must be taken into account when designing a network that will be handling credit card transactions?
AHIPPA
BPCI
CFIPS
DSOX
Which three questions should be asked when performing a business impact analysis? (Choose three.)
AWhat is the cost of both partial and full outages?
BWhat is the replacement cost of the core switches?
CWhich functions and services are critical to the company's survival?
DHow many redundant data paths are there?
EHow long could an outage be sustained?
When implementing a top-down design methodology, where would you begin collecting information to start the design process?
Athe CEO of the corporation
Bthe Application Layer of the OSI model
Cthe currently-owned network equipment
Dthe WAN edge
In a Virtual Chassis Fabric, which two platforms are supported? (Choose two.)