Sunteți pe pagina 1din 7

Back

Results

You got 56 of 65 correct

Your customer has indicated that they are about to acquire another organization and
integrate that acquisition into their corporation. Which two major areas must be
examined as part of the network design? (Choose two.)
Selected Answer

scale constraints of existing hardware


protocol incompatibilities
In an SRX Series environment, what would you use to manage your network's firewall
policy?
Selected Answer

Security Director
What are the two main sub-phases of the plan methodology? (Choose two.)
Selected Answer

Design
Access
Which two items must be included in an RFP include? (Choose two.)
Selected Answer

A list of design requirements.


The types of solutions the design must provide.
The connectivity and throughput requirements RFP element contains which two items?
(Choose two.)
Selected Answer

Traffic analysis
Hierarchical design considerations
The business continuity RFP element contains which two requirements? (Choose two.)
Selected Answer

Traffic requirements
Network efficiency requirements
What are two aspects of greenfield projects? (Choose two.)
Selected Answer

New networks with few or no restraints to consider.


Next-generation networks created from the ground up.
What are two aspects of brownfield projects? (Choose two.)
Selected Answer

Old equipment that should be replaced.


Legacy applications that are no longer used.
When analyzing customer requirements, what are two of the categories that customer
requirements can be organized into? (Choose two.)
Selected Answer

Security
Availability
Which two statements are true in regards to design proposals?
Selected Answer

You should keep your design proposal as simple as possible.


You should create the logical design before the physical design.
Which two statements are true in regards to design proposals?
Selected Answer

Security should be considered throughout the design process.


You design proposal should be clearly documented.
Which two statements are correct in regards to modularity in your network design?
Selected Answer

Modularity facilitates future growth and troubleshooting efforts.


Modularity provides hierarchical structure to your design.
The modular requirements RFP element contains which two items? (Choose two.)
Selected Answer

Functionality of each module within the design


Hierarchical design considerations
What are two ways that a user's business model is important for network design
purposes? (Choose two.)
Selected Answer

It suggests certain budgetary and scheduling constraints.


It allows the engineer to infer certain technical requirements.
You are asked to provide a network design for a project which spans the needs of
multiple organizational entities. Which key contact will you need to help define
success for this activity?
Selected Answer

the project manager overseeing all network development activities


What are two important considerations with respect to the customer's IT
organization which might affect your design? (Choose two.)
Selected Answer

availability of funding to increase IT staffing


staff expertise levels in the technology under consideration
You are the network administrator for a large university, and are ready to upgrade
your network. You want to solicit multiple vendors for design suggestions to help
you define your plan moving forward. Which two methods should you employ? (Choose
two.)
Selected Answer

Attend industry conferences.


Publish an RFP to key vendors.
Which two statements describe business continuity? (Choose two.)
Selected Answer

The ability to reestablish full functionality quickly after a disaster.


The prevention of interruption to mission-critical services.
What are the first two steps of business continuity planning? (Choose two.)
Selected Answer

know your network


assess the risks
Which statements is true in regards to the Formulate the Plan step of business
continuity planning?
Selected Answer

You should perform a risk assessment.


Which two statements are true in regards to the Test the Plan step of business
continuity planning? (Choose two.)
Selected Answer

You should test the plan hypothetically on paper.


You should only test the plan if the risk-assessment shows that more than 10% of
the customer's revenue is at risk.
Which two statements are true in regards to the solution overview section of an
RFP? (Choose two.)
Selected Answer

It should address the customer's goals, scope, and requirements.


It is an overview of Juniper's value proposition to the customer.
Which two statements are true in regards to the technical specifications section of
an RFP? (Choose two.)
Selected Answer

It should address the customer's goals, scope, and requirements.


It should contain the logical and physical topology design requirements.
What is the second step of the Juniper recommended executive summary structure of
an RFP?
Selected Answer

Identification of business benefits.


What is the forth step of the Juniper recommended executive summary structure of an
RFP?
Selected Answer

Relevant supporting information outlining why the customer should choose your plan.
What should be the third item in your network design checklist?
Selected Answer

The steps for designing a network topology.


Which three critical design blocks or functional areas benefit from HA design
solutions? (Choose three.)
Selected Answer

WAN
data center
campus
What are three relevant considerations for determining the appropriate amount of
bandwidth for a site? (Choose three.)
Selected Answer

quantity of users at that site


applications used at that site
equipment types at that site
What are two valid reasons to enable route summarization? (Choose two.)
Selected Answer

to reduce routing overhead


to benefit from a hierarchical IP addressing plan
VLANs provide separation of which type of domain?
Selected Answer

broadcast domains
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer

Redundant power supplies for network devices


Virtual Chassis for EX devices
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer

LAGs towards the LAN.


Multiple physical uplinks
In which two situations does physical device redundancy make sense in a network
design? (Choose two.)
Selected Answer

When downtime is not acceptable for device upgrades.


When zero impact to users and applications is required during device failures.
In which two situations does power supply redundancy make sense in a network
design? (Choose two.)
Selected Answer

When redundant power sources are present on site.


When a two-device HA solution is not possible.
Which two statements are true regarding chassis clustering? (Choose two.)
Selected Answer

The chassis cluster uses a control link between the two nodes.
The chassis cluster must contain two identical SRX Series devices.
Which two statements are true regarding chassis clustering? (Choose two.)
Selected Answer

The chassis cluster uses a fabric link between the two nodes.
The chassis cluster nodes can be located in different cities.
Which statement is true in regards to VRRP?
Selected Answer

The VRRP members can contain two different routing platforms.


Which of the two statements are true in regards to campus redundancy best
practices? (Choose two.)
Selected Answer

You need to include redundant wireless access points in your design.


You need to include network redundancy in your design.
You must design a campus that involves Ethernet switches that will be using Cat 6
copper cables. What is the maximum distance between the Ethernet switches?
Selected Answer

100 meters
You are gathering information to determine capacity, density, and scaling of
systems for a campus switching design. What information is critical to the design?
(Choose three.)
Selected Answer

the number of physical VoIP phones not connected to a desktop


the number of users with a fixed desktop station and attached IP phone
the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS
machines)
Which application would be used to manage Juniper EX Series switches?
Selected Answer

Network Director
Network Director is an example of which type of network management application?
Selected Answer
centralized
Which two statements are true in regards to network capacity planning? (Choose
two.)
Selected Answer

The network management platform is not important.


The application behavior is important.
You must design a network for a large campus building with many users who are in
different departments. Which technology should you use for your design?
Selected Answer

VLAN
You are designing a network in which access between different groups must be
tightly restricted. What should you do to accomplish this task?
Selected Answer

Use a firewall with security policies to control the traffic.


Connectivity issues have been seen by the users in remote offices when attempting
to access resources at the corporate headquarters. You must design a fix for this
issues. Which technology should you include in your design?
Selected Answer

redundant WAN links


You must design a network requires a VPN technology that employs low application
latency between spoke devices. The customer has also stated that they do not wish
to use PKI certificates as a form of authentication. Which VPN technology should
you recommend in this situation?
Selected Answer

full mesh VPN


Which Junos Space application can be used to manage L3 VPNs on MX devices?
Selected Answer

Connectivity Services Director


Which Junos Space application can be used to store and manage events for SRX
devices?
Selected Answer

Security Director: Logging and Reporting


In regards to a Junos Space deployment, which two statements are true?
Selected Answer

Junos Space typically uses the eth0 interface to manage devices through the OOB
network.
Junos Space can only communicate with devices through it's eth0 interface.
You customer has deployed Juniper devices and network devices from other vendors in
their network. They would like you to propose a data correlation and logging
solution that will work with Juniper devices, as well as the network devices from
the other vendors in their network. Which solution would you propose in this
situation?"
Selected Answer

Juniper Secure Analytics


Your customer wants to ensure that their data center is completely prepared for a
disaster recovery scenario. What would you recommend?
Selected Answer

Deploying a Data Center Interconnect.


Which two data center network architectures might be proposed by other vendors to
compete with Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.)
Selected Answer

three-tier architecture
TRILL
Your customer has had troubles in the past with his STP implementations and has
asked you to design a Layer 2 network that doesn't require STP. Which technology
can you recommend to the customer?
Selected Answer

Virtual Chassis
What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
Selected Answer

Multiple devices are inter-connected into a single logical device.


It supports up to 40 Gbps interfaces.
Which two technologies can you use to stretch Layer 2 traffic between two data
centers over a DCI? (Choose two.)
Selected Answer

GRE
EVPN
Your customers new data center contains network devices from multiple vendors. You
have been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer

MACsec
VXLAN
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer

VRRP
VPLS
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)"
Selected Answer

PIM
IGMPv2
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer

LLDP
RSTP
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer

LACP
ISIS
Which data-interchange format is used to automate JUNOS?
Selected Answer

JSON
Which automation tool can you use to automate Junos OS platforms?
Selected Answer

PyEZ
Which two statements properly describe Junos event scripts? (Choose two.)
Selected Answer

Junos event scripts are triggered manually.


Junos event scripts can be used to monitor the overall status of the device.
Which automation tool can you use to automate Junos OS platforms?
Selected Answer

Chef
Retake

S-ar putea să vă placă și