Which device plays the role of authenticator in an 802.1X design as shown in the exhibit?

Click the Exhibit button. Which device plays the role of authenticator in an 802.1X design as shown in the exhibit?A . Device CB . Device AC . Device DD . Device BView AnswerAnswer: A

January 13, 2021 No Comments READ MORE +

Which two statements are true regarding a Virtual Chassis? (Choose two.)

Which two statements are true regarding a Virtual Chassis? (Choose two.)A . A Virtual Chassis must be configured on the same series but not the same model.B . A Virtual Chassis supports up to 10 participating devices.C . A Virtual Chassis supports only two participating devices.D . A Virtual Chassis...

January 13, 2021 No Comments READ MORE +

Which two pieces of information should be included in an RFP response? (Choose two.)

Which two pieces of information should be included in an RFP response? (Choose two.)A . a list of contributing material including technical publications, training guides, and courseware used to build the proposed designB . design details including information about the devices, protocols, and technologies included in the proposed designC ....

January 12, 2021 No Comments READ MORE +

What are two features used to enable high availability? (Choose two.)

What are two features used to enable high availability? (Choose two.)A . VRRPB . chassis clusteringC . full-duplex modeD . SNMPView AnswerAnswer: AB

January 12, 2021 No Comments READ MORE +

What are three examples of physical security? (Choose three.)

What are three examples of physical security? (Choose three.)A . security camerasB . access door keypadsC . a mantrapD . man in the middleE . intrusion detection and preventionView AnswerAnswer: ABC

January 11, 2021 No Comments READ MORE +

In this scenario, which VPN technology would be used to accomplish this task?

You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. In this scenario, which VPN technology would be used to accomplish this task?A . IPsec VPNB . Layer 3 VPNC . GRED...

January 11, 2021 No Comments READ MORE +

Why would you recommend Junos Space Security Director in a network design?

Why would you recommend Junos Space Security Director in a network design?A . It simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks.B . It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.C . It helps administrators to more...

January 10, 2021 No Comments READ MORE +

Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API?

Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API?A . REST ExplorerB . JSNAPyC . JETD . PyEZView AnswerAnswer: D

January 10, 2021 No Comments READ MORE +

When discussing network reliability, what does the term “five nines” mean?

When discussing network reliability, what does the term “five nines” mean?A . The network is up 99.999% of the time.B . The network is up .99999% of the time.C . The network is up 9.9999% of the time.D . The network is up .09999% of the time.View AnswerAnswer: A

January 8, 2021 No Comments READ MORE +

What should you do to accomplish this task?

Click the Exhibit button. Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task?A . Use VRRP on Agg-1 and...

January 7, 2021 No Comments READ MORE +