Which component triggers the quarantine of an infected endpoint?
Which component triggers the quarantine of an infected endpoint?A . ALGB . firewallC . Policy EnforcerD . switchView AnswerAnswer: C
Which two pieces of information should be included in an RFP response? (Choose two.)
Which two pieces of information should be included in an RFP response? (Choose two.)A . a list of contributing material including technical publications, training guides, and courseware used to build the proposed designB . design details including information about the devices, protocols, and technologies included in the proposed designC ....
Which statement is true in this situation?
You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. Which statement is true in this situation?A . The connection should be secured using IPsec.B . The WAN edge devices must support MPLD ....
Which two features would cause latency in a WAN connection? (Choose two.)
Which two features would cause latency in a WAN connection? (Choose two.)A . IPSB . syslogC . telemetryD . UTM antivirusView AnswerAnswer: AD
What is the first step of business continuity planning?
What is the first step of business continuity planning?A . know your networkB . test the planC . assess the riskD . formulate the planView AnswerAnswer: A
For which purpose would you collect this information?
You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. For which purpose would you collect this information?A . risk assessmentB . redundancyC . high availabilityD...
What are three types of automation scripts used on a Junos device? (Choose three.)
What are three types of automation scripts used on a Junos device? (Choose three.)A . op scriptsB . commit scriptsC . boot scriptsD . event scriptsE . control scriptsView AnswerAnswer: ABD
Which statement is true in this scenario?
You are performing a risk assessment for a network design. Which statement is true in this scenario?A . Some risks can be safely ignored.B . The likelihood of a risk occurring should not be considered.C . A network must be designed for an uptime of five nines.D . All identified...
What are three components of an RFP? (Choose three.)
What are three components of an RFP? (Choose three.)A . general information about the existing network environmentB . a list of devices to meet the design requirementsC . a list of design requirementsD . a list of available IP addresses within their current IP allocationE . the types of solutions...
In this scenario, which statement is true?
You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?A . A network baseline identifies devices that do not have redundant components.B . A network baseline identifies traffic growth patterns across network devices.C . A network baseline identifies how many...