Which two statements are correct about greenfield and brownfield deployments? (Choose two.)
A.
A brownfield deployment has no network environment.
B.
A greenfield deployment has no network environment.
C.
A greenfield deployment has a network environment and must be upgraded.
D.
A brownfield deployment has a network environment and must be upgraded.
Answer:
B,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
Which aspect of network design facilitates future growth and troubleshooting efforts?
A.
business continuity
B.
high availability
C.
modularity
D.
security
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
You are the network architect with a large banking institution with operations around the world. Any outage results in lost revenue for your company, and may result in lost customers. Network uptime is your top priority. In this scenario, what should be your focus?
A.
return on investment
B.
business continuity
C.
capacity planning
D.
service visualization
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which three categories should the collected data be sorted into during the data analysis phase? (Choose three.)
A.
customer requirements
B.
customer data
C.
Industry standards
D.
personal data
E.
project boundaries
Answer:
A,C,E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 5
What are two characteristics of a greenfield deployment? (Choose two.)
A.
A greenfield deployment means that there are fewer restrictions.
B.
A greenfield deployment is more common.
C.
A greenfield deployment always implies integration with other vendor products.
D.
A greenfield deployment means a new deployment.
Answer:
A,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
What are two prerequisites of capacity planning in a network design? (Choose two.)
A.
predicting traffic projections for future growth
B.
understanding historical application behavior
C.
understanding current application behavior
D.
understanding historical growth
Answer:
A,C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which two features does Secure Web Gateway provide? (Choose two.)
A.
name resolution services
B.
proxy services
C.
application queuing services
D.
firewall services
Answer:
B,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Which two products comprise Juniper’s SASE solution? (Choose two.)
A.
Juniper
B.
Juniper Secure Edge
C.
Paragon Active Assurance
D.
Mist Al-Driven SD-WAN
Answer:
B,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Which Juniper ATP Cloud feature detects threats in HTTPS without decryption?
A.
Encrypted Traffic Insights
B.
DNSSEC
C.
Paragon Active Assurance
D.
SSL
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
What are two fundamental functions of Cloud Access Security Broker (CASB)? (Choose two.)
A.
compliance
B.
redundancy
C.
performance
D.
visibility
Answer:
A,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
You need to deploy a content filtering solution to block access to some Web sites. In this scenario, which solution would you implement?
A.
IDP
B.
UTM
C.
firewall rules
D.
Juniper ATP On-Premises
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Which two statements are correct about the Juniper Connected Security strategy? (Choose two.)
A.
It extends attack mitigation to routers and switches.
B.
It extends attack mitigation to network chokepoints.
C.
It extends security to all user connections.
D.
It extends security to every point of connection on the network.
Answer:
A,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
You want to provide employees with controlled access to the corporate network with company devices, ensure secure access for printers and cameras, and enable employees to use their devices on the corporate network. Which two methods satisfy the requirements? (Choose two.)
A.
implementing MAC authentication for printers and cameras
B.
implementing MAC authentication for laptops
C.
implementing 802.1x authentication for printers and cameras
D.
implementing 802.1x authentication for laptops
Answer:
A,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
You want to capture an accurate baseline of your network. In this situation, which two actions should you perform? (Choose two.)
A.
Maintain an understanding of the applications that should run on your network.
B.
Test the restoration of the rescue configurations.
C.
Standardize the module population across the network.
D.
Collect an extensive history of network performance data.
Answer:
A,D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
Your company requires the ability to quickly recover from a misconfigured router breaking its forwarding and control planes. They decide to deploy terminal servers with connections to all router console ports to provide this capability. Which two strategies will satisfy the requirements? (Choose two.)
A.
Connect the terminal servers using a switch connected to inet6.0 on the production network routers.
B.
Connect the terminal servers using a 4G LTE modem.
C.
Connect the terminal servers using a parallel network of separate routers.
D.
Connect the terminal servers using a switch connected to a separate routing instance on the production network routers.