You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to
have direct adjacencies between your remote sites.
Which two solutions would meet the requirements? (Choose two.)
A. MPLS Layer 3 VPN
B. GRE tunnels over the Internet
C. VPLS Layer 2 VPN
D. IPsec tunnels over the Internet
What is the first step of business continuity planning?
A. know your network
B. test the plan
C. assess the risk
D. formulate the plan
What are three types of automation scripts used on a Junos device? (Choose three.)
A. op scripts
B. commit scripts
C. boot scripts
D. event scripts
E. control scripts
What are two valid reasons to enable route summarization? (Choose two.)
A. to reduce routing overhead
B. to reduce the coexistence of BGP with IGPs
C. to benefit from a hierarchical IP addressing plan
D. to enable the use of more than one routing protocol
You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure. Which statement is true about the proposed solution?
A. IPsec packets can be fragmented once encrypted.
B. IPsec tunnels will require an MPLS infrastructure through the WAN.
C. IPsec can require MTU modifications to accommodate the additional overhead.
D. Packets that are passed through an IPsec tunnel are not encrypted.
A customer wants to implement an automation system that can update BGP routes without commits and
can make hundreds of changes per minute.
Which Junos automation tool would accomplish this task?
A. REST Explorer
B. JSNAPy
C. JET
D. event scripts
You are designing a network management strategy for a new network. The requirements for the
management of network devices are shown below:
Administrator passwords must have an expiration date.
Administrators must be assigned role-specific privileges on each device.
In this scenario, which statement is true?
A. Local authentication must be used on each device.
B. A centralized AAA system must be used for authentication.
C. All devices must be configured with the same privilege levels.
D. Each user must have a unique login account.
You are asked to provide a design proposal for a data center environment. As part of your solution, you are
asked to simplify the management of the ToR EX Series switches.
In this scenario, which solution will accomplish this requirement?
A. Clos fabric
B. MC-LAG
C. Virtual Chassis
D. VRRP
Which three steps are part of business continuity planning? (Choose three.)
A. Assess the risks.
B. Know your staff.
C. Know your network.
D. Understand your tools.
E. Test the plan.
In your network design, you must ensure that all user sessions passing through an SRX Series device
remain active if there is a device failure.
Which mechanism will accomplish this design requirement?
A. chassis clustering
B. MC-LAG
C. Virtual Chassis
D. VRRP