Which two statements properly describe Junos event policies? (Choose two.)

Which two statements properly describe Junos event policies? (Choose two.)A . An event policy uses if-then-else logic.B . An event policy uses for-loop logic.C . You can execute Junos OS operational command for the action of an event policy.D . You cannot execute Junos OS operational command for the action...

August 23, 2021 No Comments READ MORE +

What are two aspects of greenfield projects? (Choose two.)

What are two aspects of greenfield projects? (Choose two.)A . New networks with few or no restraints to consider.B . Old equipment that should be replaced.C . Legacy applications that are no longer used.D . Next-generation networks created from the ground up.View AnswerAnswer: AD

August 23, 2021 No Comments READ MORE +

Referring to the exhibit, which two statements are correct in regards to VRRP?

Exhibit: Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.) A. You should use VRRP on the SRX devices to WAN connections. B. You should use VRRP on the SRX devices for users in Group-A. C. You should use VRRP on the SRX devices...

August 23, 2021 No Comments READ MORE +

Which statement is true in regards to VRRP?

Which statement is true in regards to VRRP?A . The VRRP members use a control link between the two nodes.B . The VRRP members use an FXP0 link between the two nodes.C . The VRRP members must contain two identical routing platforms.D . The VRRP members can contain two different...

August 22, 2021 No Comments READ MORE +

Which sub-phase of the plan methodology must you do first?

Which sub-phase of the plan methodology must you do first?A . AccessB . ScopeC . DesignD . BuildView AnswerAnswer: A

August 22, 2021 No Comments READ MORE +

Which solution should you include in your design proposal?

Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern. Which solution should you include in your design proposal?A . SSLB . NACC . QoSD . BYODView...

August 22, 2021 No Comments READ MORE +

Which name is used by a service provider to identify the edge device inside the central office facing the customer?

Which name is used by a service provider to identify the edge device inside the central office facing the customer?A . LSRB . PEC . CED . PView AnswerAnswer: B

August 22, 2021 No Comments READ MORE +

What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.)

What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.)A . OoB allows the use of Telnet as a management protocol.B . OoB provides increased network security.C . OoB is more cost-effective when purchasing equipment.D . OoB provides more reliable management access.E . OoB frees up network...

August 22, 2021 No Comments READ MORE +

Which type of platform would be used to correlate data and logs from many different network and security appliances?

Which type of platform would be used to correlate data and logs from many different network and security appliances?A . Juniper Secure AnalyticsB . MX Series routersC . Pulse SecureD . QFabricView AnswerAnswer: A

August 21, 2021 No Comments READ MORE +

Which two major areas must be examined as part of the network design?

Your customer has indicated that they are about to acquire another organization and integrate that acquisition into their corporation. Which two major areas must be examined as part of the network design? (Choose two.)A . scale constraints of existing hardwareB . regulatory approval of the takeoverC . restructuring of staff...

August 21, 2021 No Comments READ MORE +