100%(1)Il 100% ha trovato utile questo documento (1 voto)
449 visualizzazioni13 pagine
The document contains questions and answers about network design best practices. It discusses that to create a successful network design, one should understand the customer's current network and analyze current and future network behavior. The three phases of the Juniper lifecycle service approach are plan, operate, and build. The two main sub-phases of the plan methodology are access and design.
The document contains questions and answers about network design best practices. It discusses that to create a successful network design, one should understand the customer's current network and analyze current and future network behavior. The three phases of the Juniper lifecycle service approach are plan, operate, and build. The two main sub-phases of the plan methodology are access and design.
The document contains questions and answers about network design best practices. It discusses that to create a successful network design, one should understand the customer's current network and analyze current and future network behavior. The three phases of the Juniper lifecycle service approach are plan, operate, and build. The two main sub-phases of the plan methodology are access and design.
Which two statements are correct in regards to creating a successful
network design for a customer? (Choose two.)
Selected Answer You should understand the state of the customer's current network. You should analyze current and future network behavior. Correct You should understand the state of the customer's current network. You should analyze current and future network behavior. What are the three phases of the Juniper lifecycle service approach? (Choose three.) Selected Answer Plan Operate Build Correct Plan Operate Build What are the two main sub-phases of the plan methodology? (Choose two.) Selected Answer Build Design Correct Access Design Which two items are key RFP elements? (Choose two.) Selected Answer Logical design requirements Business requirements Correct Environmental requirements Business requirements The business continuity RFP element contains which two requirements? (Choose two.) Selected Answer Traffic requirements QoS requirements Correct Network efficiency requirements QoS requirements The environmental requirements RFP element contains which two items? (Choose two.) Selected Answer A detailed report that describes the facility specifications. The number of users and workstation requirements. Correct A detailed report that describes the facility specifications. The number of users and workstation requirements. The connectivity and throughput requirements RFP element contains which two items? (Choose two.) Selected Answer Traffic analysis Hierarchical design considerations Correct Number of wireless connections needed Traffic analysis What are two aspects of greenfield projects? (Choose two.) Selected Answer Next-generation networks created from the ground up. Old equipment that should be replaced. Correct New networks with few or no restraints to consider. Next-generation networks created from the ground up. When analyzing customer requirements, what are two of the categories that customer requirements can be organized into? (Choose two.) Selected Answer Core Correct Security Availability When analyzing customer requirements, what are three of the categories that customer requirements can be organized into? (Choose three.) Selected Answer Scalability Correct Performance Scalability Manageability Which two statements are true in regards to design proposals? (Choose two.) Selected Answer You should keep your design proposal as simple as possible. Correct You should create the logical design before the physical design. You should keep your design proposal as simple as possible. Which two statements are true in regards to design proposals? (Choose two.) Selected Answer Security should be considered throughout the design process. Correct Security should be considered throughout the design process. You design proposal should be clearly documented. Which two statements are correct in regards to modularity in your network design? (Choose two.) Selected Answer Modularity provides hierarchical structure to your design. Correct Modularity facilitates future growth and troubleshooting efforts. Modularity provides hierarchical structure to your design. Which two statements describe business continuity? (Choose two.) Selected Answer Manually turning on a backup server after a disaster. Correct The prevention of interruption to mission-critical services. The ability to reestablish full functionality quickly after a disaster. What are the last two steps of business continuity planning? (Choose two.) Selected Answer test the plan Correct test the plan formulate the plan Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.) Selected Answer You should perform a risk assessment. Correct You should list all the functions and services in the network. You should perform a business impact analysis. Which statements is true in regards to the Assess the Risks step of business continuity planning? Selected Answer You should perform a risk assessment. Correct You should perform a risk assessment. Which statements is true in regards to the Formulate the Plan step of business continuity planning? Selected Answer You should perform a risk assessment. Correct You should develop a plan of action to mitigate the risks. An RFP response should include which three items (Choose three.) Selected Answer A solution overview Correct A solution overview technical specifications Executive summary Which two statements describe why the executive summary section of an RFP so important? (Choose two.) Selected Answer It is an overview of Juniper's value proposition to the customer. Correct It is an overview of Juniper's value proposition to the customer. It is likely to be read by all decision makers. Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.) Selected Answer It is likely to be read by all decision makers. Correct It should contain the bill of materials. It should contain the logical and physical topology design requirements. What is the second step of the Juniper recommended executive summary structure of an RFP? Selected Answer Relevant supporting information outlining why the customer should choose your plan. Correct Identification of business benefits. What should be the first item in your network design checklist? Selected Answer A process for understanding the customer's business and technical goals. Correct A process for understanding the customer's business and technical goals. What should be the third item in your network design checklist? Selected Answer A process for understanding the customer's business and technical goals. Correct The steps for designing a network topology. What should be the fourth item in your network design checklist? Selected Answer A process for understanding the customer's business and technical goals. Correct A process for selecting protocols, address schemes, naming conventions, and so forth. What are two rules you should follow when writing an executive summary of an RFP? (choose two.) Selected Answer Focus on organizational issues. Correct Keep it short and simple. Focus on organizational issues. You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) Selected Answer Redundant power supplies for network devices. Correct Redundant power supplies for network devices. Virtual Chassis for EX devices. You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) Selected Answer Stateful failover for firewall platforms. Chassis clusters for firewall platforms. Correct Stateful failover for firewall platforms. Chassis clusters for firewall platforms. In which two situations does a backup WAN link with another provider make sense in a network design? (Choose two.) Selected Answer When the users in the network rely on communication through VoIP. When the users in the network rely on communication through email. Correct When the users in the network rely on communication through VoIP. When the cost of a second link is less than the cost of downtime. In which two situations does physical device redundancy make sense in a network design? (Choose two.) Selected Answer When device failures in the customer's WAN provider are a possibility. When downtime is not acceptable for device upgrades. Correct When downtime is not acceptable for device upgrades. When zero impact to users and applications is required during device failures. You have designed a network in which all network devices have redundant power supplies. However, the redundant power supplies are plugged into a single power source. Which two statements are true? (Choose two.) Selected Answer The power redundancy requirements are not met as the single source of power could fail and the network devices will not stay powered on. The redundant power supplies should be plugged into separate power sources. Correct The power redundancy requirements are not met as the single source of power could fail and the network devices will not stay powered on. The redundant power supplies should be plugged into separate power sources. What are two benefits of VRRP? (Choose two.) Selected Answer open standards protocol provides redundancy through a virtual IP address Correct open standards protocol provides redundancy through a virtual IP address You are attempting to form a chassis cluster with an SRX340 and an SRX345 but the chassis cluster formation is failing. Why is the chassis cluster failing to properly form? Selected Answer The SRX345 does not support chassis clustering Correct The SRX model numbers must be the same to form a chassis cluster. Which two statements are true regarding chassis clustering? (Choose two.) Selected Answer The chassis cluster nodes must be within 10 feet of each other. The chassis cluster uses an FXP10 link between the two nodes. Correct The chassis cluster uses a fabric link between the two nodes. The chassis cluster nodes can be located in different cities. Which statement is true in regards to VRRP? Selected Answer The VRRP members use an FXP0 link between the two nodes. Correct The VRRP members can contain two different routing platforms. Which statement is true in regards to VRRP? Selected Answer The maximum number of routing devices in a VRRP group is four. Correct The maximum number of routing devices in a VRRP group is two. Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) Selected Answer You need to include hardware redundancy in your design. Correct You need to include hardware redundancy in your design. You must include highly available redundant connections for all applications in your design. Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) Selected Answer Hardware redundancy is not necessary for the wireless clients in your design. Correct You need to include network redundancy in your design. You need to include redundant wireless access points in your design. You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables. What is the maximum distance between the Ethernet switches? Selected Answer 100 meters Correct 100 meters Which two statements are true when determining the size and scope of a new network design? (Choose two.) Selected Answer The number of users is not important. Correct The type of devices is important. The number of users is important. You have been tasked to determine the capacity and scaling of systems for a campus switching design. Which two statements are true? (Choose two.) Selected Answer The number of remote workers. Correct The average bandwidth usage of users. The average number of wireless devices that will be connecting to the network. You must design a network for a large campus building with many users who are in different departments. Which technology should you use for your design? Selected Answer VLAN Correct VLAN You are designing a network design in which access between different groups must be tightly restricted. What should you do to accomplish this task? Selected Answer A Layer 3 switch Correct A Layer 4 firewall Connectivity issues have been seen by the users in remote offices when attempting to access resources at the corporate headquarters. You must design a fix for this issues. Which technology should you include in your design? Selected Answer redundant WAN links Correct redundant WAN links You customer currently has a hub-and-spoke VPN but has seen that the forwarding capabilities of the hub device being overwhelmed during times of high traffic between spoke devices. Also, due to recent cutbacks, the IT staff is already overwhelmed. What should you recommend as a solution? Selected Answer Replace the hub-and-spoke VPN with a full mesh MPLS VPN. Correct Replace the hub-and-spoke VPN with an ADVPN. You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely. Which technology would you recommend? Selected Answer hub-and-spoke VPN Correct SSL VPN Which Junos Space application can be used to manage VLANs on EX devices? Selected Answer Network Director Correct Network Director Which Junos Space application can be used to store and manage events for SRX devices? Selected Answer Network Director Correct Security Director: Logging and Reporting In regards to a Junos Space deployment, which two statements are true? Selected Answer Junos Space typically uses the eth0 interface to manage devices through the OOB network. Junos Space can only communicate with devices through it's eth3 interface. Correct Junos Space typically uses the eth0 interface to manage devices through the OOB network. Junos Space typically uses the eth3 interface to manage devices through the in-band network. Junos Space Security Director is an example of which type of network management solution? Selected Answer op script Correct centralized Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario. What would you recommend? Selected Answer Deploying centralized management. Correct Deploying a Data Center Interconnect. Which Junos Space application can be used to manage L3 VPNs on MX devices? Selected Answer Log Director Correct Connectivity Services Director You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn't require STP. Which technology can you recommend to the customer? Selected Answer Virtual Chassis Correct Virtual Chassis Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.) Selected Answer Each connected host in a data center is no more than three hops away from every other host in a data center. VCF uses a hub-and-spoke architecture. Correct VCF uses a spine-and-leaf architecture. Each connected host in a data center is no more than two hops away from every other host in a data center. Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI? (Choose two.) Selected Answer GRE Correct GRE EVPN Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer VRRP Correct VPLS VRRP Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer EIGRP Correct RSVP LDP Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer LACP Correct ISIS LACP Which data-interchange format is used to automate JUNOS? Selected Answer C++ Correct JSON Which automation tool can you use to automate Junos OS platforms? Selected Answer PyEZ Correct PyEZ Which two statements properly describe Junos operational scripts? (Choose two.) Selected Answer A Junos operational script can only execute one operational command per script. Correct A Junos operational script can be executed manually. A Junos operational script can be executed automatically when a user logs in. Which two statements properly describe Junos event policies? (Choose two.) Selected Answer You can execute Junos OS operational command for the action of an event policy. Correct You can execute Junos OS operational command for the action of an event policy. An event policy uses if-then-else logic. Which two statements properly describe Junos event scripts? (Choose two.) Selected Answer Junos event scripts can be used to monitor the overall status of the device. Correct Junos event scripts are triggered automatically. Junos event scripts can be used to monitor the overall status of the device. Which two statements properly describe Junos commit scripts? (Choose two.) Selected Answer Junos commit scripts cannot enforce custom configuration rules. Correct When a candidate configuration is committed, all active commit scripts are used. Junos commit scripts can enforce custom configuration rules. Which automation tool can you use to automate Junos OS platforms? Selected Answer Chef Correct Chef