You are asked to provide a design proposal for a service provider network. The design must ensure that
customers are able to send Layer 2 traffic between sites.
In this scenario, which VPN technology would be used to accomplish this task?
A. IPsec VPN
B. Layer 3 VPN
C. GRE
D. EVPN
You are designing a WAN implementation to securely connect two remote sites to the corporate office. A
public Internet connection will be used for the connections.
Which statement is true in this situation?
A. The connection should be secured using IPsec.
B. The WAN edge devices must support MPLS.
C. The connections support Layer 2 traffic bridging.
D. The service provider can isolate traffic in a private MPLS instance.
What are three examples of physical security? (Choose three.)
A. security cameras
B. access door keypads
C. a mantrap
D. man in the middle
E. intrusion detection and prevention
Which two statements are true regarding greenfield projects? (Choose two.)
A. The amount of floor space and cooling are not defined as part of a greenfield project.
B. In greenfield projects, the existing floor space and cooling may need to be considered.
C. Greenfield projects are typically new networks with few or no restraints to consider.
D. Greenfield projects typically consist of existing network components with extensive integration required.
You are asked to secure the routing engine of all Junos devices in your design. The design should not
affect transit traffic.
Which action will accomplish this task?
A. Use a firewall filter on a revenue port.
B. Use a firewall filter on the loopback interface.
C. Use a firewall filter on the fxp0 interfaces.
D. Use a firewall filter on the management interface.
What are two tiers used in a traditional data center design? (Choose two.)
A. core
B. aggregation
C. compute
D. user
You are designing a solution to allow secure communication over the public Internet for a corporate WAN
deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate
headquarters.
Which solution will work in this scenario?
A. fill mesh IPsec VPN
B. hub-and-spoke GRE VPN
C. Layer 3 VPN
D. hub-and-spoke IPsec VPN
What are two main elements of a network design RFP? (Choose two.)
A. business requirements
B. staffing requirements
C. e-waste requirements
D. environmental requirements
What are two valid reasons to implement a network management solution within your network infrastructure? (Choose two.)
A. to increase network visibility
B. to eliminate the need for network planning
C. to reduce network operating expenditures
D. to reduce network capital expenditures
What does the network MTBF indicate?
A. the speed of the network
B. the reliability of the network
C. the age of the network
D. the cost of the network