Back
Results
You got 56 of 65 correct
Your customer has indicated that they are about to acquire another organization and
integrate that acquisition into their corporation. Which two major areas must be
examined as part of the network design? (Choose two.)
Selected Answer
scale constraints of existing hardware
protocol incompatibilities
In an SRX Series environment, what would you use to manage your network's firewall
policy?
Selected Answer
Security Director
What are the two main sub-phases of the plan methodology? (Choose two.)
Selected Answer
Design
Access
Which two items must be included in an RFP include? (Choose two.)
Selected Answer
A list of design requirements.
The types of solutions the design must provide.
The connectivity and throughput requirements RFP element contains which two items?
(Choose two.)
Selected Answer
Traffic analysis
Hierarchical design considerations
The business continuity RFP element contains which two requirements? (Choose two.)
Selected Answer
Traffic requirements
Network efficiency requirements
What are two aspects of greenfield projects? (Choose two.)
Selected Answer
New networks with few or no restraints to consider.
Next-generation networks created from the ground up.
What are two aspects of brownfield projects? (Choose two.)
Selected Answer
Old equipment that should be replaced.
Legacy applications that are no longer used.
When analyzing customer requirements, what are two of the categories that customer
requirements can be organized into? (Choose two.)
Selected Answer
Security
Availability
Which two statements are true in regards to design proposals?
Selected Answer
You should keep your design proposal as simple as possible.
You should create the logical design before the physical design.
Which two statements are true in regards to design proposals?
Selected Answer
Security should be considered throughout the design process.
You design proposal should be clearly documented.
Which two statements are correct in regards to modularity in your network design?
Selected Answer
Modularity facilitates future growth and troubleshooting efforts.
Modularity provides hierarchical structure to your design.
The modular requirements RFP element contains which two items? (Choose two.)
Selected Answer
Functionality of each module within the design
Hierarchical design considerations
What are two ways that a user's business model is important for network design
purposes? (Choose two.)
Selected Answer
It suggests certain budgetary and scheduling constraints.
It allows the engineer to infer certain technical requirements.
You are asked to provide a network design for a project which spans the needs of
multiple organizational entities. Which key contact will you need to help define
success for this activity?
Selected Answer
the project manager overseeing all network development activities
What are two important considerations with respect to the customer's IT
organization which might affect your design? (Choose two.)
Selected Answer
availability of funding to increase IT staffing
staff expertise levels in the technology under consideration
You are the network administrator for a large university, and are ready to upgrade
your network. You want to solicit multiple vendors for design suggestions to help
you define your plan moving forward. Which two methods should you employ? (Choose
two.)
Selected Answer
Attend industry conferences.
Publish an RFP to key vendors.
Which two statements describe business continuity? (Choose two.)
Selected Answer
The ability to reestablish full functionality quickly after a disaster.
The prevention of interruption to mission-critical services.
What are the first two steps of business continuity planning? (Choose two.)
Selected Answer
know your network
assess the risks
Which statements is true in regards to the Formulate the Plan step of business
continuity planning?
Selected Answer
You should perform a risk assessment.
Which two statements are true in regards to the Test the Plan step of business
continuity planning? (Choose two.)
Selected Answer
You should test the plan hypothetically on paper.
You should only test the plan if the risk-assessment shows that more than 10% of
the customer's revenue is at risk.
Which two statements are true in regards to the solution overview section of an
RFP? (Choose two.)
Selected Answer
It should address the customer's goals, scope, and requirements.
It is an overview of Juniper's value proposition to the customer.
Which two statements are true in regards to the technical specifications section of
an RFP? (Choose two.)
Selected Answer
It should address the customer's goals, scope, and requirements.
It should contain the logical and physical topology design requirements.
What is the second step of the Juniper recommended executive summary structure of
an RFP?
Selected Answer
Identification of business benefits.
What is the forth step of the Juniper recommended executive summary structure of an
RFP?
Selected Answer
Relevant supporting information outlining why the customer should choose your plan.
What should be the third item in your network design checklist?
Selected Answer
The steps for designing a network topology.
Which three critical design blocks or functional areas benefit from HA design
solutions? (Choose three.)
Selected Answer
WAN
data center
campus
What are three relevant considerations for determining the appropriate amount of
bandwidth for a site? (Choose three.)
Selected Answer
quantity of users at that site
applications used at that site
equipment types at that site
What are two valid reasons to enable route summarization? (Choose two.)
Selected Answer
to reduce routing overhead
to benefit from a hierarchical IP addressing plan
VLANs provide separation of which type of domain?
Selected Answer
broadcast domains
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
Redundant power supplies for network devices
Virtual Chassis for EX devices
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
LAGs towards the LAN.
Multiple physical uplinks
In which two situations does physical device redundancy make sense in a network
design? (Choose two.)
Selected Answer
When downtime is not acceptable for device upgrades.
When zero impact to users and applications is required during device failures.
In which two situations does power supply redundancy make sense in a network
design? (Choose two.)
Selected Answer
When redundant power sources are present on site.
When a two-device HA solution is not possible.
Which two statements are true regarding chassis clustering? (Choose two.)
Selected Answer
The chassis cluster uses a control link between the two nodes.
The chassis cluster must contain two identical SRX Series devices.
Which two statements are true regarding chassis clustering? (Choose two.)
Selected Answer
The chassis cluster uses a fabric link between the two nodes.
The chassis cluster nodes can be located in different cities.
Which statement is true in regards to VRRP?
Selected Answer
The VRRP members can contain two different routing platforms.
Which of the two statements are true in regards to campus redundancy best
practices? (Choose two.)
Selected Answer
You need to include redundant wireless access points in your design.
You need to include network redundancy in your design.
You must design a campus that involves Ethernet switches that will be using Cat 6
copper cables. What is the maximum distance between the Ethernet switches?
Selected Answer
100 meters
You are gathering information to determine capacity, density, and scaling of
systems for a campus switching design. What information is critical to the design?
(Choose three.)
Selected Answer
the number of physical VoIP phones not connected to a desktop
the number of users with a fixed desktop station and attached IP phone
the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS
machines)
Which application would be used to manage Juniper EX Series switches?
Selected Answer
Network Director
Network Director is an example of which type of network management application?
Selected Answer
centralized
Which two statements are true in regards to network capacity planning? (Choose
two.)
Selected Answer
The network management platform is not important.
The application behavior is important.
You must design a network for a large campus building with many users who are in
different departments. Which technology should you use for your design?
Selected Answer
VLAN
You are designing a network in which access between different groups must be
tightly restricted. What should you do to accomplish this task?
Selected Answer
Use a firewall with security policies to control the traffic.
Connectivity issues have been seen by the users in remote offices when attempting
to access resources at the corporate headquarters. You must design a fix for this
issues. Which technology should you include in your design?
Selected Answer
redundant WAN links
You must design a network requires a VPN technology that employs low application
latency between spoke devices. The customer has also stated that they do not wish
to use PKI certificates as a form of authentication. Which VPN technology should
you recommend in this situation?
Selected Answer
full mesh VPN
Which Junos Space application can be used to manage L3 VPNs on MX devices?
Selected Answer
Connectivity Services Director
Which Junos Space application can be used to store and manage events for SRX
devices?
Selected Answer
Security Director: Logging and Reporting
In regards to a Junos Space deployment, which two statements are true?
Selected Answer
Junos Space typically uses the eth0 interface to manage devices through the OOB
network.
Junos Space can only communicate with devices through it's eth0 interface.
You customer has deployed Juniper devices and network devices from other vendors in
their network. They would like you to propose a data correlation and logging
solution that will work with Juniper devices, as well as the network devices from
the other vendors in their network. Which solution would you propose in this
situation?"
Selected Answer
Juniper Secure Analytics
Your customer wants to ensure that their data center is completely prepared for a
disaster recovery scenario. What would you recommend?
Selected Answer
Deploying a Data Center Interconnect.
Which two data center network architectures might be proposed by other vendors to
compete with Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.)
Selected Answer
three-tier architecture
TRILL
Your customer has had troubles in the past with his STP implementations and has
asked you to design a Layer 2 network that doesn't require STP. Which technology
can you recommend to the customer?
Selected Answer
Virtual Chassis
What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
Selected Answer
Multiple devices are inter-connected into a single logical device.
It supports up to 40 Gbps interfaces.
Which two technologies can you use to stretch Layer 2 traffic between two data
centers over a DCI? (Choose two.)
Selected Answer
GRE
EVPN
Your customers new data center contains network devices from multiple vendors. You
have been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer
MACsec
VXLAN
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer
VRRP
VPLS
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)"
Selected Answer
PIM
IGMPv2
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer
LLDP
RSTP
Your customers new network contains network devices from multiple vendors. You have
been asked to propose two technologies that will work among all the vendors'
networking equipment. Which two technologies can you recommend for the design?
(Choose two.)
Selected Answer
LACP
ISIS
Which data-interchange format is used to automate JUNOS?
Selected Answer
JSON
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
PyEZ
Which two statements properly describe Junos event scripts? (Choose two.)
Selected Answer
Junos event scripts are triggered manually.
Junos event scripts can be used to monitor the overall status of the device.
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
Chef
Retake