You are asked to design a new data center connection where connections between switches will be encrypted for Layer 2 traffic In this scenario, which solution will provide the required encryption^
You are asked to design a new data center connection where connections between switches will be encrypted for Layer 2 traffic In this scenario, which solution will provide the required encryption^A . IPsecB . TLSC . SSLD . MACsecView AnswerAnswer: D
Which access control methodology should you use in this scenario?
You are asked to design security policies based on team membership. Which access control methodology should you use in this scenario?A . non-discretionary access controlB . role-based access controlC . mandatory access controlD . discretionary access controlView AnswerAnswer: B
In this scenario, which two statements would you include in your inspection report?
You are inspecting a small data center your company just purchased You notice several blank panels and cable management system components in a storage room that are not installed on the equipment racks In this scenario, which two statements would you include in your inspection report? (Choose two.)A . The...
In this scenario, which BGP capability must be supported on the spines?
You are designing an IP fabric underlay using IBGP with the spines serving as route reflectors. In this scenario, which BGP capability must be supported on the spines?A . add-pathB . route-monitoringC . rib-shardingD . route-refresh-priorityView AnswerAnswer: A
You have a highly latency-sensitive application that is mission critical to your company's operation. In this scenario, what will enable you to identify issues within three second accuracy?
You have a highly latency-sensitive application that is mission critical to your company's operation. In this scenario, what will enable you to identify issues within three second accuracy?A . RMON1B . RMON2C . JTID . LDAPView AnswerAnswer: C
When using BGP Layer 2 VPN for a Data Center Interconnect, which statement about MAC learning is correct?
When using BGP Layer 2 VPN for a Data Center Interconnect, which statement about MAC learning is correct?A . MAC learning is not used.B . Management plane MAC learning is used.C . Data plane MAC learning is used.D . Control plane MAC learning is usedView AnswerAnswer: B
In this scenario, which two CXI deployment methodologies satisfy this requirement?
You are designing a new Data Center Interconnect (DCI) that will be MPLS-based where the PE routers need to learn local and remote MAC addresses. In this scenario, which two CXI deployment methodologies satisfy this requirement? (Choose two)A . VPLSB . EVPNC . LDP Layer 2 circuitsD . BGP Layer...
Which DCI implementation satisfies these requirements?
You are asked to design a DCI that offers policy control, active/active multihoming with load balancing, and minimizes flooding of BUM traffic. Which DCI implementation satisfies these requirements?A . EVPNB . circuit cross-connectC . BGP Layer 2 VPND . VPLSLAGView AnswerAnswer: A
You are asked to create an underlay network that will scale from a small system to a large system and can be integrated into a Contrail solution In this scenario, which protocol satisfies these requirements'5
You are asked to create an underlay network that will scale from a small system to a large system and can be integrated into a Contrail solution In this scenario, which protocol satisfies these requirements'5A . EVPNB . VXLANC . BGPD . MPLSView AnswerAnswer: D
In this scenario, which Juniper Networks solution would accomplish this task?
You must deploy a solution within your data center that will provide capacity planning for your virtual machine environment. In this scenario, which Juniper Networks solution would accomplish this task?A . Contrail CloudB . Juniper Secure AnalyticsC . Contrail InsightsD . Junos SpaceView AnswerAnswer: A