Which data-interchange format is used to automate JUNOS?
- A . YAML
- B . JavaScript
- C . Visual Basic
- D . Pascal
Which two statements describe business continuity? (Choose two.)
- A . The prevention of interruption to mission-critical services.
- B . The ability to reestablish full functionality quickly after a disaster.
- C . Manually turning on a backup server after a disaster.
- D . Manually loading previously backed up data.
Which two statements describe why the executive summary section of an RFP so important? (Choose two.)
- A . It is likely to be read by all decision makers.
- B . It is an overview of Juniper’s value proposition to the customer.
- C . It outlines the technical benefits of the proposed design.
- D . It addresses the customer’s goals, scope, and requirements.
What are two advantages of using an out-of-band (OOB) management network?
- A . An OOB management network is more reliable than in-band management network.
- B . An OOB management network is less reliable than in-band management network.
- C . An OOB management network requires higher bandwidth requirements than in-band management network.
- D . An OOB management network can function with lower bandwidth requirements than in-band management network.
Which two industry standard automation platforms are used to provision Juniper data center switches? (Choose two.)
- A . Python
- B . Chef
- C . OpenView
- D . Tivoli
What should be the third item in your network design checklist?
- A . A validation process for analyzing customer’s existing environment.
- B . A process for selecting protocols, address schemes, naming conventions, and so forth.
- C . A process for understanding the customer’s business and technical goals.
- D . The steps for designing a network topology.
Which statement is true in regards to VRRP?
- A . The VRRP members use a control link between the two nodes.
- B . The VRRP members use an FXP0 link between the two nodes.
- C . The VRRP members must contain two identical routing platforms.
- D . The VRRP members can contain two different routing platforms.
Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.)
- A . It should contain the logical and physical topology design requirements.
- B . It is likely to be read by all decision makers.
- C . It should contain the bill of materials.
- D . It should address the customer’s goals, scope, and requirements.
Which automation tool uses the master/minion model for changes?
- A . Puppet
- B . Chef
- C . SaltStack
- D . Ansible
What are two aspects of brownfield projects? (Choose two.)
- A . New networks with few or no restraints to consider.
- B . Old equipment that should be replaced.
- C . Legacy applications that are no longer used.
- D . Next-generation networks created from the ground up.
What are three components of an RFP? (Choose three.)
- A . general information about the existing network environment
- B . a list of devices to meet the design requirements
- C . a list of design requirements
- D . a list of available IP addresses within their current IP allocation
- E . the types of solutions that the design must include
Which name is used by a service provider to identify the edge device inside the central office facing the customer?
- A . LSR
- B . PE
- C . CE
- D . P
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows.
The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.
In this scenario, which type of security design would fulfill this requirement?
- A . a centralized security appliance
- B . a container-based security deployment
- C . a physical security device connected to each host
- D . an all-in-one virtual security device in each host
Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for which protocol?
- A . SNMP
- B . IPv6
- C . OSPF
- D . STP
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)
- A . WAN edge
- B . aggregation
- C . core
- D . access
What is the forth step of the Juniper recommended executive summary structure of an RFP?
- A . Identification of business benefits.
- B . Relevant supporting information outlining why the customer should choose your plan.
- C . Overview of your proposed solution.
- D . Introduction of the customer’s need or problem.
What are the three phases of the Juniper lifecycle service approach? (Choose three.)
- A . Operate
- B . Migrate
- C . Plan
- D . Build
Which solution ensures data security in this environment?
- A . Use PNAC on all inter-switch connections.
- B . Use LLDP on all inter-switch connections.
- C . Use LACP on all inter-switch connections.
- D . Use MACsec on all inter-switch connections.
Which two statements are true when determining the size and scope of a new network design? (Choose two.)
- A . The number of users is important.
- B . The number of users is not important.
- C . The type of devices is important.
- D . The type of devices is not important.
On an SRX Series device, what are three match criteria of a security policy? (Choose three.)
- A . MAC address
- B . IP address
- C . QoS
- D . security zone
- E . application port
Which two statements properly describe Junos operational scripts? (Choose two.)
- A . A Junos operational script can only be only be called from another script.
- B . A Junos operational script can be executed manually.
- C . A Junos operational script can be executed automatically when a user logs in.
- D . A Junos operational script can only execute one operational command per script.
Which sub-phase of the plan methodology must you do first?
- A . Access
- B . Scope
- C . Design
- D . Build
You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers.
In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)
- A . The total number of devices is increased.
- B . The overall network performance is increased.
- C . The number of connections between devices is decreased.
- D . The number of protocols used is decreased.
What is the cost-effective cable solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters)?
- A . multimode fiber
- B . single-mode fiber
- C . power cable
- D . UTP
Your corporate network is located in a single, multifloor building. Several smaller, remote buildings connect into your main corporate network.
Which topology describes your network?
- A . data center
- B . full mesh
- C . campus
- D . hub-and-spoke
What are two benefits of VRRP? (Choose two.)
- A . proprietary protocol
- B . open standards protocol
- C . provides redundancy through a virtual IP address
- D . provides redundancy through dual routing engines
Which two statements properly describe Junos event policies? (Choose two.)
- A . An event policy uses if-then-else logic.
- B . An event policy uses for-loop logic.
- C . You can execute Junos OS operational command for the action of an event policy.
- D . You cannot execute Junos OS operational command for the action of an event policy.
Which two statements are true regarding greenfield projects? (Choose two.)
- A . The amount of floor space and cooling are not defined as part of a greenfield project.
- B . In greenfield projects, the existing floor space and cooling may need to be considered.
- C . Greenfield projects are typically new networks with few or no restraints to consider.
- D . Greenfield projects typically consist of existing network components with extensive integration required.
Which type of platform would be used to correlate data and logs from many different network and security appliances?
- A . Juniper Secure Analytics
- B . MX Series routers
- C . Pulse Secure
- D . QFabric
Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution.
Which two statements describe how you would meet the business managers’ objectives? (Choose two.)
- A . Ensure that the solution is easy to manage for the IT staff.
- B . Ensure that the solution is cost effective.
- C . Ensure that the solution is easy to use for the end user.
- D . Ensure that the solution provides a high quality experience for the user.
Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)
- A . You need to include network redundancy in your design.
- B . You need to include redundant wireless access points in your design.
- C . Hardware redundancy is not necessary for the wireless clients in your design.
- D . Redundant WAN connections are unnecessary in your design.
Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors.
Which two factors are important from an application-driven network impact perspective? (Choose two.)
- A . presence of elephant flows
- B . IGP protocols in use
- C . use of HTTPS protocols by the application
- D . short timers
You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn’t require STP.
Which technology can you recommend to the customer?
- A . Virtual Chassis
- B . VSTP
- C . VLANs
- D . IPsec
What is the first step of the Juniper recommended executive summary structure of an RFP?
- A . Identification of business benefits.
- B . Relevant supporting information outlining why the customer should choose your plan.
- C . Overview of your proposed solution.
- D . Introduction of the customer’s need or problem.
You are designing a solution to allow secure communication over the public Internet for a corporate WAN deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate headquarters.
Which solution will work in this scenario?
- A . fill mesh IPsec VPN
- B . hub-and-spoke GRE VPN
- C . Layer 3 VPN
- D . hub-and-spoke IPsec VPN
Which three characteristics are associated with the Physical Layer of the OSI reference model? (Choose three.)
- A . cables
- B . routing protocols
- C . electricity
- D . full duplex communications
- E . TCP/IP
Click the Exhibit button.
Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.
What should you do to accomplish this task?
- A . Use VRRP on Agg-1 and Agg-2.
- B . Place Agg-1 and Agg-2 in a Virtual Chassis.
- C . Use RSTP on all devices.
- D . Use BGP load balancing on all devices.
Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
- A . stub
- B . totally stubby
- C . backbone
- D . NSSA
You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network.
Which Juniper Networks product will accomplish this task?
- A . UTM
- B . Sky ATP
- C . JATP
- D . SDSN
Which two statements are true about a service-centric data center model? (Choose two.)
- A . A service-centric data center model pools compute resources.
- B . A service-centric data center model pools storage resources.
- C . A service-centric data center model does not pool storage resources.
- D . A service-centric data center model does not pool compute resources.
Which statement describes a data center is right?
- A . The data center locally hosts thousands of users with wired connections, all with three to four active devices.
- B . The data center typically involves high density topologies with multiple points of access.
- C . The data center encompasses a broad area that is used to interconnect business locations and resources.
- D . The data center houses the computing resources and services used by a company.
What are the first two steps of business continuity planning? (Choose two.)
- A . know your network
- B . test the plan
- C . formulate the plan
- D . assess the risks
What are two main elements of a network design RFP? (Choose two.)
- A . business requirements
- B . staffing requirements
- C . e-waste requirements
- D . environmental requirements
You are designing a network design in which access between different groups must be tightly restricted.
What should you do to accomplish this task?
- A . A Layer 7 IDP
- B . A Layer 3 switch
- C . A Layer 4 firewall
- D . A Layer 2 switch
Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario.
What would you recommend?
- A . Deploying a Data Center Interconnect.
- B . Deploying centralized management.
- C . Deploying decentralized management.
- D . Deploying dual uplinks to separate ISPs.
What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.)
- A . OoB allows the use of Telnet as a management protocol.
- B . OoB provides increased network security.
- C . OoB is more cost-effective when purchasing equipment.
- D . OoB provides more reliable management access.
- E . OoB frees up network bandwidth on campus switches.
Which two statements are correct in regards to creating a successful network design for a customer? (Choose two.)
- A . You should understand the state of the customer’s current network.
- B . You should analyze current and future network behavior.
- C . You should only consider greenfield network designs.
- D . You should only consider brownfield network designs.
You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites.
Which two solutions would meet these requirements? (Choose two.)
- A . IPsec tunnels over the Internet
- B . GRE tunnels over the Internet
- C . MPLS Layer 3 VPN
- D . VPLS Layer 2 VPN
What is the maximum number of chassis supported in an SRX Series chassis cluster?
- A . ten
- B . twenty
- C . four
- D . two
What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN deployment?
- A . Internet gateway
- B . MACsec
- C . power redundancy
- D . DHCP
Exhibit:
Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.)
- A . You should use VRRP on the SRX devices to WAN connections.
- B . You should use VRRP on the SRX devices for users in Group-A.
- C . You should use VRRP on the SRX devices for users in Group-B.
- D . You should use VRRP on the SRX devices for users in Group-C.
Which three questions should be asked when performing a business impact analysis? (Choose three.)
- A . What is the cost of both partial and full outages?
- B . What is the replacement cost of the core switches?
- C . Which functions and services are critical to the company’s survival?
- D . How many redundant data paths are there?
- E . How long could an outage be sustained?
You want to stretch Layer 2 traffic between two data centers.
Which three open standards protocols would be used for this task? (Choose three.)
- A . EVPN
- B . OTV
- C . VPLS
- D . FabricPath
- E . GRE
Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.)
- A . video conferences
- B . e-mail
- C . voice over IP (VoIP)
- D . customer relationship management (CRM)
Which data-interchange format is used to automate JUNOS?
- A . JSON
- B . Fortran
- C . C++
- D . Java
Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern.
Which solution should you include in your design proposal?
- A . SSL
- B . NAC
- C . QoS
- D . BYOD
The connectivity and throughput requirements RFP element contains which two items? (Choose two.)
- A . Hierarchical design considerations
- B . Number of wireless connections needed
- C . Traffic analysis
- D . Functionality of each module within the design
Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
- A . DVMRP
- B . PIM
- C . IGMPv2
- D . DTP
What is a defining characteristic of a Layer 3 network?
- A . A Layer 3 network segments broadcast traffic.
- B . A Layer 3 network forwards all traffic to a default gateway.
- C . A Layer 3 network forwards only multicast traffic.
- D . A Layer 3 network segments traffic at the presentation layer.
Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)
- A . You should list all the functions and services in the network.
- B . You should perform a business impact analysis.
- C . You should perform a risk assessment.
- D . You should develop a plan of action to mitigate the risks.
A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device.
Which three measurements do you need to satisfy the company’s requirement? (Choose three.)
- A . the number of physical desktop ports
- B . the number of power over Ethernet ports
- C . the number of guest access users
- D . the number of unmanned IP enabled end-point systems
the number of WLAN access points
You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants to enforce security measures on east-west traffic between virtual machines.
Which solution should you recommend in this situation?
- A . JATP
- B . Sky ATP
- C . Virtual Chassis
- D . vSRX
Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
- A . VPLS
- B . VRRP
- C . VTP
- D . HSRP
Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.)
- A . VCF uses a spine-and-leaf architecture.
- B . VCF uses a hub-and-spoke architecture.
- C . Each connected host in a data center is no more than three hops away from every other host in a data center.
- D . Each connected host in a data center is no more than two hops away from every other host in a data center.
What are the last two steps of business continuity planning? (Choose two.)
- A . know your network
- B . test the plan
- C . formulate the plan
- D . assess the risks
Which two statements are true regarding chassis clustering? (Choose two.)
- A . The chassis cluster uses a control link between the two nodes.
- B . The chassis cluster uses an FXP0 link between the two nodes.
- C . The chassis cluster must contain two identical MX Series devices.
- D . The chassis cluster must contain two identical SRX Series devices.
You are working on a service provider network. You will provide network services to multiple companies across your network, while maintaining separation of traffic for different corporate entities.
What are two high-level design alternatives that will meet your requirement? (Choose two.)
- A . IPsec VPN
- B . VRRP
- C . MSDP
- D . MPLS
The modular requirements RFP element contains which two items? (Choose two.)
- A . Hierarchical design considerations
- B . Number of wireless connections needed
- C . Traffic analysis
- D . Functionality of each module within the design
What are two aspects of greenfield projects? (Choose two.)
- A . New networks with few or no restraints to consider.
- B . Old equipment that should be replaced.
- C . Legacy applications that are no longer used.
- D . Next-generation networks created from the ground up.
Which two groups within the IT organization will likely need training if a new type of network equipment is deployed throughout the enterprise? (Choose two.)
- A . application development
- B . systems administrators
- C . network engineering
- D . network operations
What are two requirements that every RFP response should include? (Choose two.)
- A . a support plan that includes details about servicing the components once operational
- B . a detailed competitor comparison document that indicates the proposed design is the least expensive option
- C . a detailed forecast of exception handling after the design has been implemented and is operational
- D . an implementation plan that includes a description of how the design will be implemented
Which two items must be included in an RFP include? (Choose two.)
- A . A list of design requirements.
- B . The new design of the network.
- C . An analysis of application behavior in the network.
- D . The types of solutions the design must provide.
You want to use standard cabling instead of crossover cabling in an environment without MDIX.
In which two situations would this apply? (Choose two.)
- A . server-to-switch
- B . computer-to-switch
- C . computer-to-computer
- D . switch-to-switch
Which design boundary is caused by the customer’s existing physical environment?
- A . Marketing users are not permitted access to the company’s financial servers.
- B . Current infrastructure lacks the media to interconnect buildings with each other.
- C . Key stakeholders disagree on how the funding for the project should be spent.
- D . HTTP traffic is expected to increase on the network by 57% over the next two years.
Which two items are key RFP elements? (Choose two.)
- A . Physical design requirements
- B . Modular requirements
- C . Logical design requirements
- D . Connectivity and throughput requirements
You need to deploy an IPsec VPN technology that provides low application latency when a remote office is communicating with another remote office. This solution must also provide low management overhead.
Which IPsec VPN technology should you choose for this design?
- A . SSL VPN
- B . full mesh VPN
- C . hub-and-spoke VPN
- D . ADVPN
You are developing a network monitoring strategy to track network response time and availability. The monitoring strategy should be scalable to accommodate future network growth.
Which two statements are true in this scenario? (Choose two.)
- A . Network reachability monitoring functions should be centralized to a dedicated monitoring device.
- B . RPM allows the monitoring of reachability, but does not allow delay or jitter monitoring.
- C . Network reachability monitoring functions should be delegated to each network device.
- D . RMON is a standardized system that is not vendor specific.
You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely.
Which technology would you recommend?
- A . ADVPN
- B . hub-and-spoke VPN
- C . full mesh VPN
- D . SSL VPN
You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?
- A . A network baseline identifies devices that do not have redundant components.
- B . A network baseline identifies traffic growth patterns across network devices.
- C . A network baseline identifies how many users are connected to the network.
- D . A network baseline identifies the type and level of traffic load on the network.
You are asked to deploy VPNs in your network.
What are two deployment models you would use? (Choose two.)
- A . site to site
- B . hub and spoke
- C . overlay
- D . hierarchical
Which two statements properly describe Junos event scripts? (Choose two.)
- A . Junos event scripts are triggered manually.
- B . Junos event scripts are triggered automatically.
- C . Junos event scripts can be used to monitor the overall status of the device.
- D . Junos event scripts cannot be used to monitor the overall status of the device.
An RFP response should include which three items (Choose three.)
- A . Executive summary
- B . Bill of materials
- C . A solution overview
- D . technical specifications
A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute.
Which Junos automation tool would accomplish this task?
- A . REST Explorer
- B . JSNAPy
- C . JET
- D . event scripts
Your customer has indicated that they are about to acquire another organization and integrate that acquisition into their corporation.
Which two major areas must be examined as part of the network design? (Choose two.)
- A . scale constraints of existing hardware
- B . regulatory approval of the takeover
- C . restructuring of staff responsibilities
- D . protocol incompatibilities
You are examining the customer’s IT organization and its responsibilities to determine how it will be impacted by your design. In this scenario, which three business functions are typically provided? (Choose three.)
- A . network architecture and design
- B . compute resourceprovisioning
- C . manufacturing
- D . network operations
- E . product marketing
What are two reasons why you would send an RFP to multiple vendors (Choose two.)
- A . to eliminate vendors who cannot meet the requirements
- B . to warranty the process against fraud
- C . to satisfy international law requiring a minimum of three vendors
- D . to compare competing proposals
You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables.
What is the maximum distance between the Ethernet switches?
- A . 100 feet
- B . 1000 feet
- C . 100 meters
- D . 1000 meters
You are designing a network management strategy for a new network.
The requirements for the management of network devices are shown below:
– Administrator passwords must have an expiration date.
– Administrators must be assigned role-specific privileges on each device.
In this scenario, which statement is true?
- A . Local authentication must be used on each device.
- B . A centralized AAA system must be used for authentication.
- C . All devices must be configured with the same privilege levels.
- D . Each user must have a unique login account.
Network Director is an example of which type of network management application?
- A . on-box
- B . out-of-band
- C . centralized
- D . op script
Why would you recommend Junos Space Security Director in a network design?
- A . It simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks.
- B . It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.
- C . It helps administrators to more quickly and intuitively manage all phases of a security policy life cycle
- D . It provides detection, isolation, and resolution of network faults and incidents.
Which statements is true in regards to the Assess the Risks step of business continuity planning?
- A . You should list all the functions and services in the network.
- B . You should perform a business impact analysis.
- C . You should perform a risk assessment.
- D . You should develop a plan of action to mitigate the risks.
A customer has determined the need to upgrade the network so that the packaging and shipping facilities can meet current demand. The customer has voiced concerns that the network design and implementation cannot affect current sales in any way.
What are two ways to address this concern in your network design? (Choose two.)
- A . Create continuity plans.
- B . Collect job aids.
- C . Define security measures.
- D . Analyze packet flow.
As part of your automation design, you need an off-box system that will be able to monitor telemetry information. You must then use that information to dynamically update devices as needed to ensure optimal network traffic flow.
Which automation solution would accomplish this goal?
- A . Ruby
- B . SaltStack
- C . Chef
- D . Puppet
When implementing a top-down design methodology, where would you begin collecting information to start the design process?
- A . the CEO of the corporation
- B . the Application Layer of the OSI model
- C . the currently-owned network equipment
- D . the WAN edge
Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
- A . ISIS
- B . LACP
- C . GLBP
- D . PAgP
You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.)
- A . Virtual Chassis for EX devices.
- B . High bandwidth uplink.
- C . Redundant power supplies for network devices.
- D . SFP interfaces.
You must design a network for a large campus building with many users who are in different departments.
Which technology should you use for your design?
- A . VLAN
- B . GRE
- C . BGP
- D . RIP
You are working with a customer who specializes in selling custom toy boxes in more than 50 stores. The customer’s financial information must be kept secure.
Which security standard should you include in your design proposal?
- A . user-based firewall
- B . NAC
- C . BYOD
- D . PCI compliance
What are three components used to enforce 802.1X in your design? (Choose three.)
- A . authenticator
- B . VoIP phone
- C . authentication server
- D . supplicant
- E . edge router
When discussing network reliability, what does the term “five nines” mean?
- A . The network is up 99.999% of the time.
- B . The network is up .99999% of the time.
- C . The network is up 9.9999% of the time.
- D . The network is up .09999% of the time.