<< Prev Question Next Question >>

Question 47/150

Your customer is a government organization with strict security requirements. They want to expand their Layer 2 infrastructure between multiple buildings within the same campus environment.
They also want to ensure that no unauthorized devices are connected between the switches in the different buildings.
Which solution ensures data security in this environment?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: You are designing a solution to allow secure communication o...
Question 2: Which solution ensures data security in this environment?...
Question 3: Which two data center network architectures might be propose...
Question 4: Which sub-phase of the plan methodology must you do first?...
Question 5: What is a design consideration for using IBGP for the underl...
Question 6: You are in the process of developing a business continuity p...
Question 7: You are asked to provide a design proposal for a data center...
Question 8: Which two technologies would be used to encapsulate frames t...
Question 9: Which statement is true about 3-stage IP fabrics?...
Question 10: You are designing a highly resilient network, which two high...
Question 11: Exhibit: (Exhibit) Referring to the exhibit, what should you...
Question 12: Which three options are effective ways of gathering data abo...
Question 13: What are three ways to secure a customer's network that incl...
Question 14: What should be the fourth item in your network design checkl...
Question 15: You are designing a data center network that will require th...
Question 16: On an SRX Series device, what are three match criteria of a ...
Question 17: Which two statements are true regarding chassis clustering? ...
Question 18: Which popular data center architecture provides improved ava...
Question 19: What are two benefits of VRRP? (Choose two.)...
Question 20: Which two items are key RFP elements? (Choose two.)...
Question 21: You are considering replacing a traditional MPLS WAN with a ...
Question 22: You are the network administrator for a large university, an...
Question 23: What are two necessary parameters for achieving a fast roami...
Question 24: Which three characteristics are associated with the Physical...
Question 25: You are asked to design a branch WAN. The branch sites have ...
Question 26: In which two instances should you use Postman as part of net...
Question 27: Which two statements correctly describe an ESI-LAG? (Choose ...
Question 28: What are the three phases of the Juniper lifecycle service a...
Question 29: VLANs provide separation of which type of domain?...
Question 30: Your customers new network contains network devices from mul...
Question 31: You are asked to examine the infrastructure requirements nee...
Question 32: You must provide role-based access to a particular network r...
Question 33: In which two situations does a backup WAN link with another ...
Question 34: What does the Virtual Extensible LAN (VXLAN) overlay solutio...
Question 35: You are asked to secure a branch location in your network. W...
Question 36: A service provider has requested that you develop a design f...
Question 37: When discussing network reliability, what does the term "fiv...
Question 38: You are considering changing an IBGP-based IP fabric design ...
Question 39: Which two versions of the Juniper SRX are appropriate for de...
Question 40: What are three environmental characteristics that affect the...
Question 41: Exhibit: (Exhibit) Referring to the exhibit, which two state...
Question 42: What are two issues that affect the uptime of a network? (Ch...
Question 43: What are two phases of assessment when designing network sec...
Question 44: Your customer is deploying a new unified communications (UC)...
Question 45: Your customer frequently hosts visitors who are not employee...
Question 46: What are three considerations for network capacity planning?...
Question 47: Your customer is a government organization with strict secur...
Question 48: What is the function of the access tier in a traditional Lay...
Question 49: According to the WLA Standards Framework, which phase of wir...
Question 50: In reviewing the customer's IT organization, you must determ...
Question 51: You are designing a highly resilient network, which two high...
Question 52: Which two statements properly describe Junos commit scripts?...
Question 53: SRX Series devices support which type of HA feature?...
Question 54: What are the two main sub-phases of the plan methodology? (C...
Question 55: You are gathering information to determine capacity, density...
Question 56: You are attempting to form a chassis cluster with an SRX340 ...
Question 57: Your corporate campus consists of a single large building wi...
Question 58: What are three use cases for Data Center Interconnect? (Choo...
Question 59: What two statements correctly describe the REST API on Junos...
Question 60: What are two prerequisites of capacity planning in a network...
Question 61: Your customer is engaged in healthcare service support. What...
Question 62: What are two primary characteristics of the core tier in a n...
Question 63: You customer has had troubles in the past with his STP imple...
Question 64: You are designing a network design in which access between d...
Question 65: You are designing a network management strategy for a new ne...
Question 66: In a bring-your-own-device deployment, where would non-authe...
Question 67: Which Junos Space application can be used to store and manag...
Question 68: What are two aspects of brownfield projects? (Choose two.)...
Question 69: Which three questions should be asked when performing a busi...
Question 70: You want to use standard cabling instead of crossover cablin...
Question 71: Which two groups within the IT organization will likely need...
Question 72: A company requires a managed WAN solution that supports Laye...
Question 73: Which two mechanisms allow administrators to authenticate on...
Question 74: What should be the third item in your network design checkli...
Question 75: Which of the two statements are true in regards to campus re...
Question 76: An application uses broadcast traffic to send data to IPv4 h...
Question 77: Your customers new network contains network devices from mul...
Question 78: Which three steps are part of business continuity planning? ...
Question 79: Your customers new data center contains network devices from...
Question 80: You are asked to review a migration plan from standalone SRX...
Question 81: Which two switches should you recommend as leaf nodes for a ...
Question 82: You are asked to provide a design proposal for an enterprise...
Question 83: Which two statements are true regarding virtual chassis fabr...
Question 84: Your manager asks you to determine a reliable, cost-effectiv...
Question 85: Which three critical design blocks or functional areas benef...
Question 86: A customer has determined the need to upgrade the network so...
Question 87: When analyzing customer requirements, what are three of the ...
Question 88: Which three categories should the collected data be sorted i...
Question 89: You are asked to deploy VPNs in your network. What are two d...
Question 90: Which two statements are correct about using BGP as the unde...
Question 91: You are asked to design a backup schedule using existing too...
Question 92: The business requirements RFP element contains which two ite...
Question 93: Which Junos Space application can be used to manage L3 VPNs ...
Question 94: Which two statements are correct about greenfield and brownf...
Question 95: A local university has decided to expand their research capa...
Question 96: You are consulting in a network architect role for a multina...
Question 97: Which two technologies can you use to stretch Layer 2 traffi...
Question 98: What are three examples of physical security? (Choose three....
Question 99: What are three types of automation scripts used on a Junos d...
Question 100: What should be included in a network design to improve resil...
Question 101: You are asked to create a proof of concept software-defined ...
Question 102: Your customer is a growing enterprise with limited capital t...
Question 103: Which name is used by a service provider to identify the edg...
Question 104: You are performing a risk assessment for a network design. W...
Question 105: You are asked to provide a network design for a project whic...
Question 106: What are two rules you should follow when writing an executi...
Question 107: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 108: You are asked to evaluate a WAN design for a corporation wit...
Question 109: Which solution would ensure that voice traffic is treated wi...
Question 110: You are examining the customer's IT organization and its res...
Question 111: What are two fundamental functions of Cloud Access Security ...
Question 112: What is a defining characteristic of a Layer 3 network?...
Question 113: Your customers new network contains network devices from mul...
Question 114: What are two requirements that every RFP response should inc...
Question 115: You have an access switch that must connect to an aggregatio...
Question 116: As part of your automation design, you need an off-box syste...
Question 117: Which network model would be appropriate for a 30-story buil...
Question 118: Your corporate campus consists of a single large building wi...
Question 119: Your customer is building a new data center and the applicat...
Question 120: A customer wants to implement an automation system that can ...
Question 121: What are two characteristics of a greenfield deployment? (Ch...
Question 122: Click the Exhibit button. (Exhibit) After a series of outage...
Question 123: Which VPN protocol has the highest overhead?...
Question 124: Which device plays the role of authenticator in an 802.1X de...
Question 125: What does the network MTTR measure?...
Question 126: A hospital has issued an RFP for a full network refresh. The...
Question 127: What are two guidelines when designing campus networks? (Cho...
Question 128: You are the network architect with a large banking instituti...
Question 129: You are consulting on the redesign for a large retail networ...
Question 130: Which statements is true in regards to the Formulate the Pla...
Question 131: Which application would be used to manage Juniper EX Series ...
Question 132: You are a network engineer at a large university. The archit...
Question 133: In an SRX Series environment, what would you use to manage y...
Question 134: In which two situations does physical device redundancy make...
Question 135: Which statement is true in regards to VRRP?...
Question 136: What are three components of an RFP? (Choose three.)...
Question 137: You must design a campus that involves Ethernet switches tha...
Question 138: What are three relevant considerations for determining the a...
Question 139: Which two statements properly describe Junos event policies?...
Question 140: You are gathering information to determine capacity, density...
Question 141: You must design a low latency WAN link for a new emergency b...
Question 142: You are required to stop zero-day threats while designing a ...
Question 143: What are two popular WAN service offerings that you would us...
Question 144: Which two pieces of information should be included in an RFP...
Question 145: What are three advantages of out-of-band (OoB) management ov...
Question 146: Which two statements are true regarding chassis clustering? ...
Question 147: You want to capture an accurate baseline of your network. In...
Question 148: What are two main data center profile solution templates? (C...
Question 149: Your corporate network is located in a single, multifloor bu...
Question 150: The environmental requirements RFP element contains which tw...