Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two statements are correct about using BGP as the underlay routing protocol in an IP fabric? (Choose two.)

A.

Static routes are required for EBGP neighbors to establish.

B.

EBGP underlay requires the multipath multiple-as parameter with the corresponding load-balancing policy.

C.

Route Reflection can be used in an IBGP underlay to increase control plane scalability.

D.

Using an IGP is required for an EBGP underlay.

Full Access
Question # 5

What is an overlay solution that expands the Layer 2 network space across the WAN?

A.

EVPN-VXLAN

B.

IPsec

C.

GRE

D.

MC-LAG

Full Access
Question # 6

Click the Exhibit button.

Referring to the exhibit, which oversubscription ratio applies to Switch-3?

A.

2:4

B.

4:1

C.

2:1

D.

1:2

Full Access
Question # 7

What is a design consideration for using IBGP for the underlay in a Clos data center fabric?

A.

A full mesh of IBGP neighbors will be required.

B.

BGP ADD-PATH must be enabled for multipath to work on leafs.

C.

An IGP will always be required for learning loopback addresses.

D.

A 5-stage Clos topology will not work with IBGP underlay.

Full Access
Question # 8

You are a network engineer at a large university. The architecture team has recently chosen Mist to replace the existing controller-based system and has replaced all the access points (APs) throughout the campus. Since the migration, users have been complaining about VoIP calls being dropped while moving between buildings. You have already validated that the APs provide appropriate coverage.

Which change would help alleviate this issue?

A.

Deploy a Mist Edge.

B.

Deploy a Session Smart Conductor.

C.

Deploy a Session Smart Router.

D.

Deploy additional access points.

Full Access
Question # 9

You want to provide employees with controlled access to the corporate network with company devices, ensure secure access for printers and cameras, and enable employees to use their devices on the corporate network.

Which two methods satisfy the requirements? (Choose two.)

A.

implementing MAC authentication for printers and cameras

B.

implementing MAC authentication for laptops

C.

implementing 802.1x authentication for printers and cameras

D.

implementing 802.1x authentication for laptops

Full Access
Question # 10

You are asked to design a branch WAN. The branch sites have limited bandwidth and it is imperative to limit overhead.

Which technology will satisfy the requirements?

A.

Secure Vector Routing

B.

Generic Routing Encapsulation

C.

IPsec

D.

EVPN-VXLAN

Full Access
Question # 11

You must design a low latency WAN link for a new emergency backup site. The traffic contains propriety company information and must be protected. To save computing resources, you cannot encrypt the traffic across the link.

In this scenario, which type of WAN would you propose for the new link?

A.

public

B.

private

C.

satellite

D.

wireless

Full Access
Question # 12

You are designing the network for a small campus using Mist. You have two Junos switches that support EVPN-VXLAN core devices and two Junos access switches that do not support EVPN-VXLAN.

Which campus design is available with these devices?

A.

EVPN Multihoming

B.

Campus Fabric core-distribution

C.

Campus Fabric 3-staqe IP Clos

D.

Campus Fabric 5-staqe IP Clos

Full Access
Question # 13

You are asked to design a backup schedule using existing tools and incurring no additional expense.

Which two protocols would you consider to accomplish this task? (Choose two.)

A.

rsync

B.

SMTP

C.

SFTP

D.

SNMP

Full Access
Question # 14

Click the Exhibit button.

Which two WAN functions are shown in the exhibit? (Choose two.)

A.

Data Center Interconnect

B.

WAN aggregation

C.

Internet edge

D.

private WAN

Full Access
Question # 15

You are considering replacing a traditional MPLS WAN with a SD-WAN solution.

Which two statements are true in this scenario? (Choose two.)

A.

SD-WAN requires the use of specialized ASICs to route application traffic.

B.

SD-WAN can provide similar security and privacy to legacy WANs.

C.

Direct Internet Access can be made available in remote offices using a local breakout.

D.

Direct Internet Access can be made available in remote offices using a central breakout.

Full Access
Question # 16

You are designing the security domain of a large data center requiring 10 GbE interfaces.

Which two Juniper products would you recommend in this situation? (Choose two.)

A.

SRX5800

B.

SRX345

C.

vSRX

D.

SRX300

Full Access
Question # 17

You are asked to design an enterprise network.

In this scenario, which two product families are appropriate to deploy in the distribution layer according to Juniper Networks? (Choose two.)

A.

QFX

B.

SRX

C.

ACX

D.

EX

Full Access
Question # 18

You are the network architect with a large banking institution with operations around the world. Any outage results in lost revenue for your company, and may result in lost customers. Network uptime is your top priority.

In this scenario, what should be your focus?

A.

return on investment

B.

business continuity

C.

capacity planning

D.

service visualization

Full Access
Question # 19

Which two technologies would be used to encapsulate frames to provide Layer 2 reachability across an IP fabric data center? (Choose two.)

A.

MACsec

B.

IPsec

C.

MPLS

D.

VXLAN

Full Access