A) Junos Fusion Provider Edge
B) Virtual Chassis
C) Junos Fusion Data Center
D) Virtual Chassis Fabric
Correct Answer
verified
Multiple Choice
A) vSRX
B) vRR
C) vEPC
D) TCX
Correct Answer
verified
Multiple Choice
A) Data Center Interconnect
B) network redundancy
C) SDN
D) SAN protocols
Correct Answer
verified
Multiple Choice
A) It is necessary to use MC-LAG.
B) You should connect each server to one member with a two-interface LAG.
C) You should connect each server to two different members.
D) It is not necessary to use MC-LAG.
Correct Answer
verified
Multiple Choice
A) You should use BA classifiers on R1.
B) You should use multifield classifiers on R2, R3, and R4.
C) You should use multifield classifiers on R1.
D) You should use BA classifiers on R2, R3, and R4.
Correct Answer
verified
Multiple Choice
A) QFX5110
B) QFX10002
C) EX4600
D) EX4300
Correct Answer
verified
Multiple Choice
A) MC-LAG
B) RTG
C) LAG
D) ESI
Correct Answer
verified
Multiple Choice
A) MC-LAG
B) RTG
C) LAG
D) ESI
Correct Answer
verified
Multiple Choice
A) AppFormix
B) Contrail
C) JTI
D) Junos Space
Correct Answer
verified
Multiple Choice
A) MPLS
B) GRE
C) BGP
D) IPsec
Correct Answer
verified
Multiple Choice
A) 1.000
B) 1.251
C) 1.527
D) 1.752
Correct Answer
verified
Multiple Choice
A) IEEE 802.1BR
B) MPLS
C) VCCP
D) IS-IS
Correct Answer
verified
Multiple Choice
A) QFX5110
B) QFX10002
C) EX4600
D) EX4300
Correct Answer
verified
Multiple Choice
A) This deployment scenario is recommended when firewall services are used extensively for east-west traffic.
B) End-host traffic is services through one SRX node during non-failure conditions.
C) This deployment scenario is recommended when firewall services are used extensively for north-south traffic.
D) End-host traffic is serviced through both SRX nodes during non-failure conditions.
Correct Answer
verified
Multiple Choice
A) session authentication
B) DDoS protection
C) asset classification
D) network subnetting
Correct Answer
verified
Multiple Choice
A) Network functions are being virtualized.
B) Public IP addresses are easy to obtain but not manage.
C) There is a proliferation of distributed applications.
D) There is a proliferation of monolithic applications.
Correct Answer
verified
Multiple Choice
A) Spine devices must assume the RE role.
B) Leaf devices must have a direct link to all other leaf devices.
C) Spine devices must assume the line card role.
D) Leaf devices must have a direct link to all spine devices.
Correct Answer
verified
Multiple Choice
A) You should deploy CoS on R1 and R4.
B) You should deploy CoS on R1, R3 and R4.
C) You should deploy CoS on S1, R1, R2, R3, R4, and S2.
D) You should deploy CoS on R1, R2, R3, and R4.
Correct Answer
verified
Multiple Choice
A) protocol decodes
B) zero-day protection
C) traffic normalization
D) application firewall
E) application tracking
Correct Answer
verified
Multiple Choice
A) IBGP and Q-in-Q
B) IBGP and MP-BGP
C) IBGP and MPLS
D) IBGP and GVRP
Correct Answer
verified
Showing 21 - 40 of 74
Related Exams