What are two prerequisites of capacity planning in a network design? (Choose two.)
Apredicting traffic projections for future growth
Bunderstanding historical application behavior
Cunderstanding current application behavior
Dunderstanding historical growth
You are asked to design a backup schedule using existing tools and incurring no additional expense.
Which two protocols would you consider to accomplish this task? (Choose two.)
Arsync
BSMTP
CSFTP
DSNMP
Which aspect of network design facilitates future growth and troubleshooting efforts?
Abusiness continuity
Bhigh availability
Cmodularity
Dsecurity
You need to deploy a content filtering solution to block access to some Web sites.
In this scenario, which solution would you implement?
AIDP
BUTM
Cfirewall rules
DJuniper ATP On-Premises
What are two characteristics of a greenfield deployment? (Choose two.)
AA greenfield deployment means that there are fewer restrictions.
BA greenfield deployment is more common.
CA greenfield deployment always implies integration with other vendor products.
DA greenfield deployment means a new deployment.
You want to capture an accurate baseline of your network.
In this situation, which two actions should you perform? (Choose two.)
AMaintain an understanding of the applications that should run on your network.
BTest the restoration of the rescue configurations.
CStandardize the module population across the network.
DCollect an extensive history of network performance data.
Which two features does Secure Web Gateway provide? (Choose two.)
Aname resolution services
Bproxy services
Capplication queuing services
Dfirewall services
What are two fundamental functions of Cloud Access Security Broker (CASB)? (Choose two.)
Acompliance
Bredundancy
Cperformance
Dvisibility
Which Juniper ATP Cloud feature detects threats in HTTPS without decryption?
AEncrypted Traffic Insights
BDNSSEC
CParagon Active Assurance
DSSL
Which two statements are correct about greenfield and brownfield deployments? (Choose two.)
AA brownfield deployment has no network environment.
BA greenfield deployment has no network environment.
CA greenfield deployment has a network environment and must be upgraded.
DA brownfield deployment has a network environment and must be upgraded.
You want to provide employees with controlled access to the corporate network with company devices, ensure secure access for printers and cameras, and enable employees to use their devices on the corporate network.
Which two methods satisfy the requirements? (Choose two.)
Aimplementing MAC authentication for printers and cameras
Bimplementing MAC authentication for laptops
Cimplementing 802.1x authentication for printers and cameras
Dimplementing 802.1x authentication for laptops
You need to determine how far apart access points operating on the same channel ought to be placed.
In this scenario, what is the recommended signal strength when determining this information?
A−30 dBm
B−10 dBm
C−5 dBm
D−65 dBm
You are gathering information to determine capacity, density, and scaling of systems for a campus switching design.
What information is critical to the design? (Choose three.)
Athe number of guest users or contractors accessing with a mobile hot spot
Bthe number of unmanned IP-enabled end systems (e.g., HVAC, network printers, POS machines)
Cthe number of users with a fixed desktop station and attached IP phone
Dthe number of physical VoIP phones not connected to a desktop
Ethe number of users that are home office/mobile workers
Which two products comprise Juniper’s SASE solution? (Choose two.)
AJuniper Apstra
BJuniper Secure Edge
CParagon Active Assurance
DMist AI-Driven SD-WAN
You are the network architect with a large banking institution with operations around the world. Any outage results in lost revenue for your company, and may result in lost customers. Network uptime is your top priority.
In this scenario, what should be your focus?