Which statement is true in this situation?
You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. Which statement is true in this situation? A. The connection should be secured using IPsec. B. The WAN edge devices must support MPLS. C. The connections support Layer 2 […]
What are two phases in Juniper’s lifecycle approach when designing a network?
What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.) A. plan B. build C. buy D. oversee
Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API
Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API? A. REST Explorer B. JSNAPy C. JET D. PyEZ
What should you do to accomplish this task?
Click the Exhibit button. Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task? A. Use VRRP on Agg-1 and Agg-2. B. Place Agg-1 and […]
Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network swit
Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network switches to block a threat in real time? A. Policy Enforcer B. Sky ATP C. Juniper Secure Analytics D. SRX Series device
In this scenario, which type of security design would fulfill this requirement?
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this […]
In this scenario, what are two benefits of moving to the new infrastructure?
You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers. In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.) A. The total number of devices […]
Which two solutions would meet the requirements?
You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. Which two solutions would meet the requirements? (Choose two.) A. MPLS Layer 3 VPN B. GRE tunnels over the Internet C. VPLS Layer 2 VPN D. IPsec […]
In this scenario, which VPN technology would be used to accomplish this task?
You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. In this scenario, which VPN technology would be used to accomplish this task? A. IPsec VPN B. Layer 3 VPN C. GRE D. EVPN
For which purpose would you collect this information?
You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. For which purpose would you collect this information? A. risk assessment B. redundancy C. high availability D. disaster recovery