لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. Which statement is true in this situation?
A. The connection should be secured using IPsec
B. The WAN edge devices must support MPLS
C. The connections support Layer 2 traffic bridging
D. The service provider can isolate traffic in a private MPLS instance
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Click the Exhibit button. Which device plays the role of authenticator in an 802.1X design as shown in the exhibit?
A. Device C
B. Device A
C. Device D
D. Device B
عرض الإجابة
اجابة صحيحة: A
السؤال #3
What are two valid reasons to enable route summarization? (Choose two.)
A. to reduce routing overhead
B. to reduce the coexistence of BGP with IGPs
C. to benefit from a hierarchical IP addressing plan
D. to enable the use of more than one routing protocol
عرض الإجابة
اجابة صحيحة: AB
السؤال #4
You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. For which purpose would you collect this information?
A. risk assessment
B. redundancy
C. high availability
D. disaster recovery
عرض الإجابة
اجابة صحيحة: C
السؤال #5
What are three environmental characteristics that affect the campus network design? (Choose three.)
A. transmission media characteristics
B. distribution of users
C. locations of wiring closets
D. PC operating system
E. remote site connectivity
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. In this scenario, which VPN technology would be used to accomplish this task?
A. IPsec VPN
B. Layer 3 VPN
C. GRE
D. EVPN
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network switches to block a threat in real time?
A. Policy Enforcer
B. Sky ATP
C. Juniper Secure Analytics
D. SRX Series device
عرض الإجابة
اجابة صحيحة: BC
السؤال #8
When discussing network reliability, what does the term “five nines” mean?
A. The network is up 99
B. The network is up
C. The network is up 9
D. The network is up
عرض الإجابة
اجابة صحيحة: A
السؤال #9
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this scenario, which type of security design would fulfill this requirement?
A. a centralized security appliance
B. a container-based security deployment
C. a physical security device connected to each host
D. an all-in-one virtual security device in each host
عرض الإجابة
اجابة صحيحة: CD
السؤال #10
You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network. Which Juniper Networks product will accomplish this task?
A. UTM
B. Sky ATP
C. JATP
D. SDSN
عرض الإجابة
اجابة صحيحة: A
السؤال #11
You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers. In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)
A. The total number of devices is increased
B. The overall network performance is increased
C. The number of connections between devices is decreased
D. The number of protocols used is decreased
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Click the Exhibit button. Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task?
A. Use VRRP on Agg-1 and Agg-2
B. Place Agg-1 and Agg-2 in a Virtual Chassis
C. Use RSTP on all devices
D. Use BGP load balancing on all devices
عرض الإجابة
اجابة صحيحة: B
السؤال #13
You are performing a risk assessment for a network design. Which statement is true in this scenario?
A. Some risks can be safely ignored
B. The likelihood of a risk occurring should not be considered
C. A network must be designed for an uptime of five nines
D. All identified risks must have a mitigation plan in place
عرض الإجابة
اجابة صحيحة: D
السؤال #14
You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure. Which statement is true about the proposed solution?
A. IPsec packets can be fragmented once encrypted
B. IPsec tunnels will require an MPLS infrastructure through the WAN
C. IPsec can require MTU modifications to accommodate the additional overhead
D. Packets that are passed through an IPsec tunnel are not encrypted
عرض الإجابة
اجابة صحيحة: D
السؤال #15
You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?
A. A network baseline identifies devices that do not have redundant components
B. A network baseline identifies traffic growth patterns across network devices
C. A network baseline identifies how many users are connected to the network
D. A network baseline identifies the type and level of traffic load on the network
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: