You are asked to design a new data center connection where connections between switches will be encrypted for Layer 2 traffic In this scenario, which solution will provide the required encryption^
A . IPsec
B . TLS
C . SSL
D . MACsec
Answer: D
You are asked to design a new data center connection where connections between switches will be encrypted for Layer 2 traffic In this scenario, which solution will provide the required encryption^
A . IPsec
B . TLS
C . SSL
D . MACsec
Answer: D
You are asked to design security policies based on team membership.
Which access control methodology should you use in this scenario?
A . non-discretionary access control
B . role-based access control
C . mandatory access control
D . discretionary access control
Answer: B
You are inspecting a small data center your company just purchased You notice several blank panels and cable management system components in a storage room that are not installed on the equipment racks
In this scenario, which two statements would you include in your inspection report? (Choose two.)
A . The cable management system function is cosmetic only and is not necessary.
B . The blank panels were removed to improve cooling air flow through the racks.
C . The cable management system should be installed as soon as possible
D . The blank panels should be installed as soon as possible
Answer: A,B
You are designing an IP fabric underlay using IBGP with the spines serving as route reflectors.
In this scenario, which BGP capability must be supported on the spines?
A . add-path
B . route-monitoring
C . rib-sharding
D . route-refresh-priority
Answer: A
You have a highly latency-sensitive application that is mission critical to your company’s operation. In this scenario, what will enable you to identify issues within three second accuracy?
A . RMON1
B . RMON2
C . JTI
D . LDAP
Answer: C
When using BGP Layer 2 VPN for a Data Center Interconnect, which statement about MAC learning is correct?
A . MAC learning is not used.
B . Management plane MAC learning is used.
C . Data plane MAC learning is used.
D . Control plane MAC learning is used
Answer: B
You are designing a new Data Center Interconnect (DCI) that will be MPLS-based where the PE routers need to learn local and remote MAC addresses.
In this scenario, which two CXI deployment methodologies satisfy this requirement? (Choose two)
A . VPLS
B . EVPN
C . LDP Layer 2 circuits
D . BGP Layer 2 VPNs
Answer: B,C
You are asked to design a DCI that offers policy control, active/active multihoming with load balancing, and minimizes flooding of BUM traffic.
Which DCI implementation satisfies these requirements?
A . EVPN
B . circuit cross-connect
C . BGP Layer 2 VPN
D . VPLSLAG
Answer: A
You are asked to create an underlay network that will scale from a small system to a large system and can be integrated into a Contrail solution In this scenario, which protocol satisfies these requirements’5
A . EVPN
B . VXLAN
C . BGP
D . MPLS
Answer: D
You must deploy a solution within your data center that will provide capacity planning for your virtual machine environment.
In this scenario, which Juniper Networks solution would accomplish this task?
A . Contrail Cloud
B . Juniper Secure Analytics
C . Contrail Insights
D . Junos Space
Answer: A