Вы находитесь на странице: 1из 13

Which two statements are correct in regards to creating a successful

network design for a customer? (Choose two.)


Selected Answer
• You should understand the state of the customer's current network.
• You should analyze current and future network behavior.
Correct
• You should understand the state of the customer's current network.
• You should analyze current and future network behavior.
What are the three phases of the Juniper lifecycle service approach?
(Choose three.)
Selected Answer
• Plan
• Operate
• Build
Correct
• Plan
• Operate
• Build
What are the two main sub-phases of the plan methodology? (Choose two.)
Selected Answer
• Access
• Design
Correct
• Access
• Design
Which two items are key RFP elements? (Choose two.)
Selected Answer
• Environmental requirements
• Business requirements
Correct
• Environmental requirements
• Business requirements
The business continuity RFP element contains which two requirements?
(Choose two.)
Selected Answer
• Network efficiency requirements
• QoS requirements
Correct
• Network efficiency requirements
• QoS requirements
The environmental requirements RFP element contains which two items?
(Choose two.)
Selected Answer
• A detailed report that describes the facility specifications.
• The number of users and workstation requirements.
Correct
• A detailed report that describes the facility specifications.
• The number of users and workstation requirements.
The connectivity and throughput requirements RFP element contains
which two items? (Choose two.)
Selected Answer
• Number of wireless connections needed
• Traffic analysis
Correct
• Number of wireless connections needed
• Traffic analysis
What are two aspects of greenfield projects? (Choose two.)
Selected Answer
• New networks with few or no restraints to consider.
• Next-generation networks created from the ground up.
Correct
• New networks with few or no restraints to consider.
• Next-generation networks created from the ground up.
When analyzing customer requirements, what are two of the categories
that customer requirements can be organized into? (Choose two.)
Selected Answer
• Security
• Availability
Correct
• Security
• Availability
When analyzing customer requirements, what are three of the categories
that customer requirements can be organized into? (Choose three.)
Selected Answer
• Performance
• Scalability
• Manageability
Correct
• Performance
• Scalability
• Manageability
Which two statements are true in regards to design proposals? (Choose
two.)
Selected Answer
• You should create the logical design before the physical design.
• You should keep your design proposal as simple as possible.
Correct
• You should create the logical design before the physical design.
• You should keep your design proposal as simple as possible.
Which two statements are true in regards to design proposals? (Choose
two.)
Selected Answer
• Security should be considered throughout the design process.
• You design proposal should be clearly documented.
Correct
• Security should be considered throughout the design process.
• You design proposal should be clearly documented.
Which two statements are correct in regards to modularity in your network
design? (Choose two.)
Selected Answer
• Modularity facilitates future growth and troubleshooting efforts.
• Modularity provides hierarchical structure to your design.
Correct
• Modularity facilitates future growth and troubleshooting efforts.
• Modularity provides hierarchical structure to your design.
Which two statements describe business continuity? (Choose two.)
Selected Answer
• The prevention of interruption to mission-critical services.
• The ability to reestablish full functionality quickly after a disaster.
Correct
• The prevention of interruption to mission-critical services.
• The ability to reestablish full functionality quickly after a disaster.
What are the last two steps of business continuity planning? (Choose two.)
Selected Answer
• test the plan
• formulate the plan
Correct
• test the plan
• formulate the plan
Which two statements are true in regards to the Know Your Network step
of business continuity planning? (Choose two.)
Selected Answer
• You should list all the functions and services in the network.
• You should perform a business impact analysis.
Correct
• You should list all the functions and services in the network.
• You should perform a business impact analysis.
Which statements is true in regards to the Assess the Risks step of business
continuity planning?
Selected Answer
• You should perform a risk assessment.
Correct
• You should perform a risk assessment.
Which statements is true in regards to the Formulate the Plan step of
business continuity planning?
Selected Answer
• You should develop a plan of action to mitigate the risks.
Correct
• You should develop a plan of action to mitigate the risks.
An RFP response should include which three items (Choose three.)
Selected Answer
• A solution overview
• technical specifications
• Executive summary
Correct
• A solution overview
• technical specifications
• Executive summary
Which two statements describe why the executive summary section of an
RFP so important? (Choose two.)
Selected Answer
• It outlines the technical benefits of the proposed design.
• It is likely to be read by all decision makers.
Correct
• It is an overview of Juniper's value proposition to the customer.
• It is likely to be read by all decision makers.
Which two statements are true in regards to the technical specifications
section of an RFP? (Choose two.)
Selected Answer
• It should contain the bill of materials.
• It should contain the logical and physical topology design requirements.
Correct
• It should contain the bill of materials.
• It should contain the logical and physical topology design requirements.
What is the second step of the Juniper recommended executive summary
structure of an RFP?
Selected Answer
• Identification of business benefits.
Correct
• Identification of business benefits.
What should be the first item in your network design checklist?
Selected Answer
• A process for understanding the customer's business and technical goals.
Correct
• A process for understanding the customer's business and technical goals.
What should be the third item in your network design checklist?
Selected Answer
• The steps for designing a network topology.
Correct
• The steps for designing a network topology.
What should be the fourth item in your network design checklist?
Selected Answer
• A process for selecting protocols, address schemes, naming conventions, and so forth.
Correct
• A process for selecting protocols, address schemes, naming conventions, and so forth.
What are two rules you should follow when writing an executive summary
of an RFP? (choose two.)
Selected Answer
• Keep it short and simple.
• Focus on organizational issues.
Correct
• Keep it short and simple.
• Focus on organizational issues.
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
• Redundant power supplies for network devices.
• Virtual Chassis for EX devices.
Correct
• Redundant power supplies for network devices.
• Virtual Chassis for EX devices.
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
• Chassis clusters for firewall platforms.
• Stateless failover for firewall platforms.
Correct
• Stateful failover for firewall platforms.
• Chassis clusters for firewall platforms.
In which two situations does a backup WAN link with another provider
make sense in a network design? (Choose two.)
Selected Answer
• When the users in the network rely on communication through VoIP.
• When the cost of a second link is less than the cost of downtime.
Correct
• When the users in the network rely on communication through VoIP.
• When the cost of a second link is less than the cost of downtime.
In which two situations does physical device redundancy make sense in a
network design? (Choose two.)
Selected Answer
• When downtime is not acceptable for device upgrades.
• When zero impact to users and applications is required during device failures.
Correct
• When downtime is not acceptable for device upgrades.
• When zero impact to users and applications is required during device failures.
You have designed a network in which all network devices have redundant
power supplies. However, the redundant power supplies are plugged into a
single power source. Which two statements are true? (Choose two.)
Selected Answer
• The power redundancy requirements are not met as the single source of power could fail and
the network devices will not stay powered on.
• The redundant power supplies should be plugged into separate power sources.
Correct
• The power redundancy requirements are not met as the single source of power could fail and
the network devices will not stay powered on.
• The redundant power supplies should be plugged into separate power sources.
What are two benefits of VRRP? (Choose two.)
Selected Answer
• open standards protocol
• provides redundancy through a virtual IP address
Correct
• open standards protocol
• provides redundancy through a virtual IP address
You are attempting to form a chassis cluster with an SRX340 and an
SRX345 but the chassis cluster formation is failing. Why is the chassis
cluster failing to properly form?
Selected Answer
• The SRX model numbers must be the same to form a chassis cluster.
Correct
• The SRX model numbers must be the same to form a chassis cluster.
Which two statements are true regarding chassis clustering? (Choose two.)
Selected Answer
• The chassis cluster uses a fabric link between the two nodes.
• The chassis cluster nodes can be located in different cities.
Correct
• The chassis cluster uses a fabric link between the two nodes.
• The chassis cluster nodes can be located in different cities.
Which statement is true in regards to VRRP?
Selected Answer
• The VRRP members can contain two different routing platforms.
Correct
• The VRRP members can contain two different routing platforms.
Which statement is true in regards to VRRP?
Selected Answer
• The maximum number of routing devices in a VRRP group is two.
Correct
• The maximum number of routing devices in a VRRP group is two.
Which of the two statements are true in regards to campus redundancy
best practices? (Choose two.)
Selected Answer
• You need to include hardware redundancy in your design.
• You must include highly available redundant connections for all applications in your design.
Correct
• You need to include hardware redundancy in your design.
• You must include highly available redundant connections for all applications in your design.
Which of the two statements are true in regards to campus redundancy
best practices? (Choose two.)
Selected Answer
• You need to include network redundancy in your design.
• You need to include redundant wireless access points in your design.
Correct
• You need to include network redundancy in your design.
• You need to include redundant wireless access points in your design.
You must design a campus that involves Ethernet switches that will be
using Cat 6 copper cables. What is the maximum distance between the
Ethernet switches?
Selected Answer
• 100 meters
Correct
• 100 meters
Which two statements are true when determining the size and scope of a
new network design? (Choose two.)
Selected Answer
• The type of devices is important.
• The number of users is important.
Correct
• The type of devices is important.
• The number of users is important.
You have been tasked to determine the capacity and scaling of systems for a
campus switching design. Which two statements are true? (Choose two.)
Selected Answer
• The average bandwidth usage of users.
• The average number of wireless devices that will be connecting to the network.
Correct
• The average bandwidth usage of users.
• The average number of wireless devices that will be connecting to the network.
You must design a network for a large campus building with many users
who are in different departments. Which technology should you use for
your design?
Selected Answer
• VLAN
Correct
• VLAN
You are designing a network design in which access between different
groups must be tightly restricted. What should you do to accomplish this
task?
Selected Answer
• A Layer 4 firewall
Correct
• A Layer 4 firewall
Connectivity issues have been seen by the users in remote offices when
attempting to access resources at the corporate headquarters. You must
design a fix for this issues. Which technology should you include in your
design?
Selected Answer
• redundant WAN links
Correct
• redundant WAN links
You customer currently has a hub-and-spoke VPN but has seen that the
forwarding capabilities of the hub device being overwhelmed during times
of high traffic between spoke devices. Also, due to recent cutbacks, the IT
staff is already overwhelmed. What should you recommend as a solution?
Selected Answer
• Replace the hub-and-spoke VPN with an ADVPN.
Correct
• Replace the hub-and-spoke VPN with an ADVPN.
You customer requires a solution that allows remote home workers to
access resources at the corporate headquarters securely. Which technology
would you recommend?
Selected Answer
• SSL VPN
Correct
• SSL VPN
Which Junos Space application can be used to manage VLANs on EX
devices?
Selected Answer
• Network Director
Correct
• Network Director
Which Junos Space application can be used to store and manage events for
SRX devices?
Selected Answer
• Security Director: Logging and Reporting
Correct
• Security Director: Logging and Reporting
In regards to a Junos Space deployment, which two statements are true?
Selected Answer
• Junos Space typically uses the eth0 interface to manage devices through the OOB network.
• Junos Space typically uses the eth3 interface to manage devices through the in-band network.
Correct
• Junos Space typically uses the eth0 interface to manage devices through the OOB network.
• Junos Space typically uses the eth3 interface to manage devices through the in-band network.
Junos Space Security Director is an example of which type of network
management solution?
Selected Answer
• centralized
Correct
• centralized
Your customer wants to ensure that their data center is completely
prepared for a disaster recovery scenario. What would you recommend?
Selected Answer
• Deploying a Data Center Interconnect.
Correct
• Deploying a Data Center Interconnect.
Which Junos Space application can be used to manage L3 VPNs on MX
devices?
Selected Answer
• Connectivity Services Director
Correct
• Connectivity Services Director
You customer has had troubles in the past with his STP implementations
and has asked you to design a Layer 2 network that doesn't require STP.
Which technology can you recommend to the customer?
Selected Answer
• Virtual Chassis
Correct
• Virtual Chassis
Which two statements are true regarding virtual chassis fabric (VCF)?
(Choose two.)
Selected Answer
• VCF uses a spine-and-leaf architecture.
• Each connected host in a data center is no more than two hops away from every other host in a
data center.
Correct
• VCF uses a spine-and-leaf architecture.
• Each connected host in a data center is no more than two hops away from every other host in a
data center.
Which two technologies can you use to stretch Layer 2 traffic between two
data centers over a DCI? (Choose two.)
Selected Answer
• GRE
• EVPN
Correct
• GRE
• EVPN
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will work
among all the vendors' networking equipment. Which two technologies can
you recommend for the design? (Choose two.)
Selected Answer
• VPLS
• VRRP
Correct
• VPLS
• VRRP
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will work
among all the vendors' networking equipment. Which two technologies can
you recommend for the design? (Choose two.)
Selected Answer
• RSVP
• LDP
Correct
• RSVP
• LDP
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will work
among all the vendors' networking equipment. Which two technologies can
you recommend for the design? (Choose two.)
Selected Answer
• ISIS
• LACP
Correct
• ISIS
• LACP
Which data-interchange format is used to automate JUNOS?
Selected Answer
• JSON
Correct
• JSON
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
• PyEZ
Correct
• PyEZ
Which two statements properly describe Junos operational scripts?
(Choose two.)
Selected Answer
• A Junos operational script can be executed manually.
• A Junos operational script can be executed automatically when a user logs in.
Correct
• A Junos operational script can be executed manually.
• A Junos operational script can be executed automatically when a user logs in.
Which two statements properly describe Junos event policies? (Choose
two.)
Selected Answer
• You can execute Junos OS operational command for the action of an event policy.
• An event policy uses if-then-else logic.
Correct
• You can execute Junos OS operational command for the action of an event policy.
• An event policy uses if-then-else logic.
Which two statements properly describe Junos event scripts? (Choose two.)
Selected Answer
• Junos event scripts are triggered automatically.
• Junos event scripts can be used to monitor the overall status of the device.
Correct
• Junos event scripts are triggered automatically.
• Junos event scripts can be used to monitor the overall status of the device.
Which two statements properly describe Junos commit scripts? (Choose
two.)
Selected Answer
• When a candidate configuration is committed, all active commit scripts are used.
• Junos commit scripts cannot enforce custom configuration rules.
Correct
• When a candidate configuration is committed, all active commit scripts are used.
• Junos commit scripts can enforce custom configuration rules.
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
• Chef
Correct
• Chef

Вам также может понравиться