Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are two prerequisites of capacity planning in a network design? (Choose two.)

A.

predicting traffic projections for future growth

B.

understanding historical application behavior

C.

understanding current application behavior

D.

understanding historical growth

Which two statements are correct about the Juniper Connected Security strategy? (Choose two.)

A.

It extends attack mitigation to routers and switches.

B.

It extends attack mitigation to network chokepoints.

C.

It extends security to all user connections.

D.

It extends security to every point of connection on the network.

Which two switches should you recommend as leaf nodes for a small data center where cost is a factor? (Choose two.)

A.

EX4300

B.

QFX5700

C.

EX4400

D.

QFX5130

Which two statements about network management are correct? (Choose two.)

A.

Fault management can discover problems before they cause downtime.

B.

Authorization validates that a user is who they claim to be.

C.

Measurement of network performance, errors, and security allows administrators to make informed decisions.

D.

Network management is added after the network is built and network designers do not need to consider it.

Click the Exhibit button.

Which two WAN functions are shown in the exhibit? (Choose two.)

A.

Data Center Interconnect

B.

WAN aggregation

C.

Internet edge

D.

private WAN

Where are path selections made for an SD-WAN router?

A.

physical interface card

B.

local packet forwarding engine

C.

local routing engine

D.

centralized controller

Which two technologies would be used to encapsulate frames to provide Layer 2 reachability across an IP fabric data center? (Choose two.)

A.

MACsec

B.

IPsec

C.

MPLS

D.

VXLAN

You are asked to design a backup schedule using existing tools and incurring no additional expense.

Which two protocols would you consider to accomplish this task? (Choose two.)

A.

rsync

B.

SMTP

C.

SFTP

D.

SNMP

You are considering changing an IBGP-based IP fabric design to one that is EBGP-based.

In this scenario, which two statements are correct about an EBGP-based design? (Choose two.)

A.

Route reflection is not required.

B.

An IGP is not required.

C.

AS numbers are not required.

D.

Confederations may be used.

SD-WAN routes security-sensitive data across MPLS, VPNs, and _______________.

A.

Internet circuits

B.

dark fiber

C.

wireless

D.

microwave