Sei sulla pagina 1di 13

Which two statements are correct in regards to creating a successful

network design for a customer? (Choose two.)


Selected Answer
 You should understand the state of the customer's current network.
 You should analyze current and future network behavior.
Correct
 You should understand the state of the customer's current network.
 You should analyze current and future network behavior.
What are the three phases of the Juniper lifecycle service approach?
(Choose three.)
Selected Answer
 Plan
 Operate
 Build
Correct
 Plan
 Operate
 Build
What are the two main sub-phases of the plan methodology? (Choose
two.)
Selected Answer
 Build
 Design
Correct
 Access
 Design
Which two items are key RFP elements? (Choose two.)
Selected Answer
 Logical design requirements
 Business requirements
Correct
 Environmental requirements
 Business requirements
The business continuity RFP element contains which two requirements?
(Choose two.)
Selected Answer
 Traffic requirements
 QoS requirements
Correct
 Network efficiency requirements
 QoS requirements
The environmental requirements RFP element contains which two
items? (Choose two.)
Selected Answer
 A detailed report that describes the facility specifications.
 The number of users and workstation requirements.
Correct
 A detailed report that describes the facility specifications.
 The number of users and workstation requirements.
The connectivity and throughput requirements RFP element contains
which two items? (Choose two.)
Selected Answer
 Traffic analysis
 Hierarchical design considerations
Correct
 Number of wireless connections needed
 Traffic analysis
What are two aspects of greenfield projects? (Choose two.)
Selected Answer
 Next-generation networks created from the ground up.
 Old equipment that should be replaced.
Correct
 New networks with few or no restraints to consider.
 Next-generation networks created from the ground up.
When analyzing customer requirements, what are two of the categories
that customer requirements can be organized into? (Choose two.)
Selected Answer
 Core
Correct
 Security
 Availability
When analyzing customer requirements, what are three of the
categories that customer requirements can be organized into? (Choose
three.)
Selected Answer
 Scalability
Correct
 Performance
 Scalability
 Manageability
Which two statements are true in regards to design proposals? (Choose
two.)
Selected Answer
 You should keep your design proposal as simple as possible.
Correct
 You should create the logical design before the physical design.
 You should keep your design proposal as simple as possible.
Which two statements are true in regards to design proposals? (Choose
two.)
Selected Answer
 Security should be considered throughout the design process.
Correct
 Security should be considered throughout the design process.
 You design proposal should be clearly documented.
Which two statements are correct in regards to modularity in your
network design? (Choose two.)
Selected Answer
 Modularity provides hierarchical structure to your design.
Correct
 Modularity facilitates future growth and troubleshooting efforts.
 Modularity provides hierarchical structure to your design.
Which two statements describe business continuity? (Choose two.)
Selected Answer
 Manually turning on a backup server after a disaster.
Correct
 The prevention of interruption to mission-critical services.
 The ability to reestablish full functionality quickly after a disaster.
What are the last two steps of business continuity planning? (Choose
two.)
Selected Answer
 test the plan
Correct
 test the plan
 formulate the plan
Which two statements are true in regards to the Know Your Network
step of business continuity planning? (Choose two.)
Selected Answer
 You should perform a risk assessment.
Correct
 You should list all the functions and services in the network.
 You should perform a business impact analysis.
Which statements is true in regards to the Assess the Risks step of
business continuity planning?
Selected Answer
 You should perform a risk assessment.
Correct
 You should perform a risk assessment.
Which statements is true in regards to the Formulate the Plan step of
business continuity planning?
Selected Answer
 You should perform a risk assessment.
Correct
 You should develop a plan of action to mitigate the risks.
An RFP response should include which three items (Choose three.)
Selected Answer
 A solution overview
Correct
 A solution overview
 technical specifications
 Executive summary
Which two statements describe why the executive summary section of
an RFP so important? (Choose two.)
Selected Answer
 It is an overview of Juniper's value proposition to the customer.
Correct
 It is an overview of Juniper's value proposition to the customer.
 It is likely to be read by all decision makers.
Which two statements are true in regards to the technical specifications
section of an RFP? (Choose two.)
Selected Answer
 It is likely to be read by all decision makers.
Correct
 It should contain the bill of materials.
 It should contain the logical and physical topology design requirements.
What is the second step of the Juniper recommended executive
summary structure of an RFP?
Selected Answer
 Relevant supporting information outlining why the customer should choose your plan.
Correct
 Identification of business benefits.
What should be the first item in your network design checklist?
Selected Answer
 A process for understanding the customer's business and technical goals.
Correct
 A process for understanding the customer's business and technical goals.
What should be the third item in your network design checklist?
Selected Answer
 A process for understanding the customer's business and technical goals.
Correct
 The steps for designing a network topology.
What should be the fourth item in your network design checklist?
Selected Answer
 A process for understanding the customer's business and technical goals.
Correct
 A process for selecting protocols, address schemes, naming conventions, and so forth.
What are two rules you should follow when writing an executive
summary of an RFP? (choose two.)
Selected Answer
 Focus on organizational issues.
Correct
 Keep it short and simple.
 Focus on organizational issues.
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
 Redundant power supplies for network devices.
Correct
 Redundant power supplies for network devices.
 Virtual Chassis for EX devices.
You are designing a highly resilient network, which two high availability
techniques should you use? (Choose two.)
Selected Answer
 Stateful failover for firewall platforms.
 Chassis clusters for firewall platforms.
Correct
 Stateful failover for firewall platforms.
 Chassis clusters for firewall platforms.
In which two situations does a backup WAN link with another provider
make sense in a network design? (Choose two.)
Selected Answer
 When the users in the network rely on communication through VoIP.
 When the users in the network rely on communication through email.
Correct
 When the users in the network rely on communication through VoIP.
 When the cost of a second link is less than the cost of downtime.
In which two situations does physical device redundancy make sense in
a network design? (Choose two.)
Selected Answer
 When device failures in the customer's WAN provider are a possibility.
 When downtime is not acceptable for device upgrades.
Correct
 When downtime is not acceptable for device upgrades.
 When zero impact to users and applications is required during device failures.
You have designed a network in which all network devices have
redundant power supplies. However, the redundant power supplies are
plugged into a single power source. Which two statements are true?
(Choose two.)
Selected Answer
 The power redundancy requirements are not met as the single source of power could fail and
the network devices will not stay powered on.
 The redundant power supplies should be plugged into separate power sources.
Correct
 The power redundancy requirements are not met as the single source of power could fail and
the network devices will not stay powered on.
 The redundant power supplies should be plugged into separate power sources.
What are two benefits of VRRP? (Choose two.)
Selected Answer
 open standards protocol
 provides redundancy through a virtual IP address
Correct
 open standards protocol
 provides redundancy through a virtual IP address
You are attempting to form a chassis cluster with an SRX340 and an
SRX345 but the chassis cluster formation is failing. Why is the chassis
cluster failing to properly form?
Selected Answer
 The SRX345 does not support chassis clustering
Correct
 The SRX model numbers must be the same to form a chassis cluster.
Which two statements are true regarding chassis clustering? (Choose
two.)
Selected Answer
 The chassis cluster nodes must be within 10 feet of each other.
 The chassis cluster uses an FXP10 link between the two nodes.
Correct
 The chassis cluster uses a fabric link between the two nodes.
 The chassis cluster nodes can be located in different cities.
Which statement is true in regards to VRRP?
Selected Answer
 The VRRP members use an FXP0 link between the two nodes.
Correct
 The VRRP members can contain two different routing platforms.
Which statement is true in regards to VRRP?
Selected Answer
 The maximum number of routing devices in a VRRP group is four.
Correct
 The maximum number of routing devices in a VRRP group is two.
Which of the two statements are true in regards to campus redundancy
best practices? (Choose two.)
Selected Answer
 You need to include hardware redundancy in your design.
Correct
 You need to include hardware redundancy in your design.
 You must include highly available redundant connections for all applications in your design.
Which of the two statements are true in regards to campus redundancy
best practices? (Choose two.)
Selected Answer
 Hardware redundancy is not necessary for the wireless clients in your design.
Correct
 You need to include network redundancy in your design.
 You need to include redundant wireless access points in your design.
You must design a campus that involves Ethernet switches that will be
using Cat 6 copper cables. What is the maximum distance between the
Ethernet switches?
Selected Answer
 100 meters
Correct
 100 meters
Which two statements are true when determining the size and scope of
a new network design? (Choose two.)
Selected Answer
 The number of users is not important.
Correct
 The type of devices is important.
 The number of users is important.
You have been tasked to determine the capacity and scaling of systems
for a campus switching design. Which two statements are true? (Choose
two.)
Selected Answer
 The number of remote workers.
Correct
 The average bandwidth usage of users.
 The average number of wireless devices that will be connecting to the network.
You must design a network for a large campus building with many
users who are in different departments. Which technology should you
use for your design?
Selected Answer
 VLAN
Correct
 VLAN
You are designing a network design in which access between different
groups must be tightly restricted. What should you do to accomplish
this task?
Selected Answer
 A Layer 3 switch
Correct
 A Layer 4 firewall
Connectivity issues have been seen by the users in remote offices when
attempting to access resources at the corporate headquarters. You
must design a fix for this issues. Which technology should you include
in your design?
Selected Answer
 redundant WAN links
Correct
 redundant WAN links
You customer currently has a hub-and-spoke VPN but has seen that the
forwarding capabilities of the hub device being overwhelmed during
times of high traffic between spoke devices. Also, due to recent
cutbacks, the IT staff is already overwhelmed. What should you
recommend as a solution?
Selected Answer
 Replace the hub-and-spoke VPN with a full mesh MPLS VPN.
Correct
 Replace the hub-and-spoke VPN with an ADVPN.
You customer requires a solution that allows remote home workers to
access resources at the corporate headquarters securely. Which
technology would you recommend?
Selected Answer
 hub-and-spoke VPN
Correct
 SSL VPN
Which Junos Space application can be used to manage VLANs on EX
devices?
Selected Answer
 Network Director
Correct
 Network Director
Which Junos Space application can be used to store and manage events
for SRX devices?
Selected Answer
 Network Director
Correct
 Security Director: Logging and Reporting
In regards to a Junos Space deployment, which two statements are
true?
Selected Answer
 Junos Space typically uses the eth0 interface to manage devices through the OOB network.
 Junos Space can only communicate with devices through it's eth3 interface.
Correct
 Junos Space typically uses the eth0 interface to manage devices through the OOB network.
 Junos Space typically uses the eth3 interface to manage devices through the in-band network.
Junos Space Security Director is an example of which type of network
management solution?
Selected Answer
 op script
Correct
 centralized
Your customer wants to ensure that their data center is completely
prepared for a disaster recovery scenario. What would you
recommend?
Selected Answer
 Deploying centralized management.
Correct
 Deploying a Data Center Interconnect.
Which Junos Space application can be used to manage L3 VPNs on MX
devices?
Selected Answer
 Log Director
Correct
 Connectivity Services Director
You customer has had troubles in the past with his STP
implementations and has asked you to design a Layer 2 network that
doesn't require STP. Which technology can you recommend to the
customer?
Selected Answer
 Virtual Chassis
Correct
 Virtual Chassis
Which two statements are true regarding virtual chassis fabric (VCF)?
(Choose two.)
Selected Answer
 Each connected host in a data center is no more than three hops away from every other host
in a data center.
 VCF uses a hub-and-spoke architecture.
Correct
 VCF uses a spine-and-leaf architecture.
 Each connected host in a data center is no more than two hops away from every other host in
a data center.
Which two technologies can you use to stretch Layer 2 traffic between
two data centers over a DCI? (Choose two.)
Selected Answer
 GRE
Correct
 GRE
 EVPN
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will
work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
Selected Answer
 VRRP
Correct
 VPLS
 VRRP
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will
work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
Selected Answer
 EIGRP
Correct
 RSVP
 LDP
Your customers new network contains network devices from multiple
vendors. You have been asked to propose two technologies that will
work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
Selected Answer
 LACP
Correct
 ISIS
 LACP
Which data-interchange format is used to automate JUNOS?
Selected Answer
 C++
Correct
 JSON
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
 PyEZ
Correct
 PyEZ
Which two statements properly describe Junos operational scripts?
(Choose two.)
Selected Answer
 A Junos operational script can only execute one operational command per script.
Correct
 A Junos operational script can be executed manually.
 A Junos operational script can be executed automatically when a user logs in.
Which two statements properly describe Junos event policies? (Choose
two.)
Selected Answer
 You can execute Junos OS operational command for the action of an event policy.
Correct
 You can execute Junos OS operational command for the action of an event policy.
 An event policy uses if-then-else logic.
Which two statements properly describe Junos event scripts? (Choose
two.)
Selected Answer
 Junos event scripts can be used to monitor the overall status of the device.
Correct
 Junos event scripts are triggered automatically.
 Junos event scripts can be used to monitor the overall status of the device.
Which two statements properly describe Junos commit scripts? (Choose
two.)
Selected Answer
 Junos commit scripts cannot enforce custom configuration rules.
Correct
 When a candidate configuration is committed, all active commit scripts are used.
 Junos commit scripts can enforce custom configuration rules.
Which automation tool can you use to automate Junos OS platforms?
Selected Answer
 Chef
Correct
 Chef

Potrebbero piacerti anche