Which two solutions would meet the requirements?

You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. Which two solutions would meet the requirements? (Choose two.)A . MPLS Layer 3 VPNB . GRE tunnels over the InternetC . VPLS...

June 15, 2019 No Comments READ MORE +

What are two features used to enable high availability? (Choose two.)

What are two features used to enable high availability? (Choose two.)A . VRRPB . chassis clusteringC . full-duplex modeD . SNMPView AnswerAnswer: AB

June 15, 2019 No Comments READ MORE +

Which two statements are true regarding greenfield projects? (Choose two.)

Which two statements are true regarding greenfield projects? (Choose two.)A . The amount of floor space and cooling are not defined as part of a greenfield project.B . In greenfield projects, the existing floor space and cooling may need to be considered.C . Greenfield projects are typically new networks with...

June 14, 2019 No Comments READ MORE +

What are two requirements that every RFP response should include? (Choose two.)

What are two requirements that every RFP response should include? (Choose two.)A . a support plan that includes details about servicing the components once operationalB . a detailed competitor comparison document that indicates the proposed design is the least expensive optionC . a detailed forecast of exception handling after the...

June 12, 2019 No Comments READ MORE +

In this scenario, which VPN technology would be used to accomplish this task?

You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. In this scenario, which VPN technology would be used to accomplish this task?A . IPsec VPNB . Layer 3 VPNC . GRED...

June 11, 2019 No Comments READ MORE +

What are three examples of physical security? (Choose three.)

What are three examples of physical security? (Choose three.)A . security camerasB . access door keypadsC . a mantrapD . man in the middleE . intrusion detection and preventionView AnswerAnswer: ABC

June 11, 2019 No Comments READ MORE +

What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.)

What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.)A . planB . buildC . buyD . overseeView AnswerAnswer: AB

June 11, 2019 No Comments READ MORE +

What are two reasons why you would send an RFP to multiple vendors (Choose two.)

What are two reasons why you would send an RFP to multiple vendors (Choose two.)A . to eliminate vendors who cannot meet the requirementsB . to warranty the process against fraudC . to satisfy international law requiring a minimum of three vendorsD . to compare competing proposalsView AnswerAnswer: AD

June 10, 2019 No Comments READ MORE +

What should you do to accomplish this task?

Click the Exhibit button. Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task?A . Use VRRP on Agg-1 and...

June 10, 2019 No Comments READ MORE +

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this scenario, which type of security design would fulfill this requirement?

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services...

June 10, 2019 No Comments READ MORE +