What are two benefits of VRRP? (Choose two.)

What are two benefits of VRRP? (Choose two.)A . proprietary protocolB . open standards protocolC . provides redundancy through a virtual IP addressD . provides redundancy through dual routing enginesView AnswerAnswer: BC

January 29, 2024 No Comments READ MORE +

What is the maximum number of chassis supported in an SRX Series chassis cluster?

What is the maximum number of chassis supported in an SRX Series chassis cluster?A . tenB . twentyC . fourD . twoView AnswerAnswer: D

January 29, 2024 No Comments READ MORE +

Which two technologies can you recommend for the design?

Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.)A . ISISB . LACPC . GLBPD . PAgPView AnswerAnswer: AB

January 29, 2024 No Comments READ MORE +

What is the forth step of the Juniper recommended executive summary structure of an RFP?

What is the forth step of the Juniper recommended executive summary structure of an RFP?A . Identification of business benefits.B . Relevant supporting information outlining why the customer should choose your plan.C . Overview of your proposed solution.D . Introduction of the customer's need or problem.View AnswerAnswer: B

January 28, 2024 No Comments READ MORE +

Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)

Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)A . You should list all the functions and services in the network.B . You should perform a business impact analysis.C . You should perform a risk assessment.D . You should develop...

January 28, 2024 No Comments READ MORE +

Which type of platform would be used to correlate data and logs from many different network and security appliances?

Which type of platform would be used to correlate data and logs from many different network and security appliances?A . Juniper Secure AnalyticsB . MX Series routersC . Pulse SecureD . QFabricView AnswerAnswer: A

January 28, 2024 No Comments READ MORE +

Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.)

Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.)A . video conferencesB . e-mailC . voice over IP (VoIP)D . customer relationship management (CRM)View AnswerAnswer: AC

January 28, 2024 No Comments READ MORE +

In this scenario, which type of security design would fulfill this requirement?

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services...

January 28, 2024 No Comments READ MORE +

In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)

In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)A . WAN edgeB . aggregationC . coreD . accessView AnswerAnswer: AD

January 28, 2024 No Comments READ MORE +

You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?

You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?A . A network baseline identifies devices that do not have redundant components.B . A network baseline identifies traffic growth patterns across network devices.C . A network baseline identifies how many...

January 28, 2024 No Comments READ MORE +