The document discusses best practices for network design, including:
- Understanding the customer's current and future network needs.
- Following the three phases of Juniper's lifecycle approach: plan, operate, build.
- Key elements of an RFP include environmental requirements, business requirements, and technical specifications.
- Design proposals should have a logical design before physical, keep it simple, and consider security.
- High availability techniques like redundant power and virtual chassis improve resilience.
The document discusses best practices for network design, including:
- Understanding the customer's current and future network needs.
- Following the three phases of Juniper's lifecycle approach: plan, operate, build.
- Key elements of an RFP include environmental requirements, business requirements, and technical specifications.
- Design proposals should have a logical design before physical, keep it simple, and consider security.
- High availability techniques like redundant power and virtual chassis improve resilience.
The document discusses best practices for network design, including:
- Understanding the customer's current and future network needs.
- Following the three phases of Juniper's lifecycle approach: plan, operate, build.
- Key elements of an RFP include environmental requirements, business requirements, and technical specifications.
- Design proposals should have a logical design before physical, keep it simple, and consider security.
- High availability techniques like redundant power and virtual chassis improve resilience.
The document discusses best practices for network design, including:
- Understanding the customer's current and future network needs.
- Following the three phases of Juniper's lifecycle approach: plan, operate, build.
- Key elements of an RFP include environmental requirements, business requirements, and technical specifications.
- Design proposals should have a logical design before physical, keep it simple, and consider security.
- High availability techniques like redundant power and virtual chassis improve resilience.
Which two statements are correct in regards to creating a successful
network design for a customer? (Choose two.)
Selected Answer • You should understand the state of the customer's current network. • You should analyze current and future network behavior. Correct • You should understand the state of the customer's current network. • You should analyze current and future network behavior. What are the three phases of the Juniper lifecycle service approach? (Choose three.) Selected Answer • Plan • Operate • Build Correct • Plan • Operate • Build What are the two main sub-phases of the plan methodology? (Choose two.) Selected Answer • Access • Design Correct • Access • Design Which two items are key RFP elements? (Choose two.) Selected Answer • Environmental requirements • Business requirements Correct • Environmental requirements • Business requirements The business continuity RFP element contains which two requirements? (Choose two.) Selected Answer • Network efficiency requirements • QoS requirements Correct • Network efficiency requirements • QoS requirements The environmental requirements RFP element contains which two items? (Choose two.) Selected Answer • A detailed report that describes the facility specifications. • The number of users and workstation requirements. Correct • A detailed report that describes the facility specifications. • The number of users and workstation requirements. The connectivity and throughput requirements RFP element contains which two items? (Choose two.) Selected Answer • Number of wireless connections needed • Traffic analysis Correct • Number of wireless connections needed • Traffic analysis What are two aspects of greenfield projects? (Choose two.) Selected Answer • New networks with few or no restraints to consider. • Next-generation networks created from the ground up. Correct • New networks with few or no restraints to consider. • Next-generation networks created from the ground up. When analyzing customer requirements, what are two of the categories that customer requirements can be organized into? (Choose two.) Selected Answer • Security • Availability Correct • Security • Availability When analyzing customer requirements, what are three of the categories that customer requirements can be organized into? (Choose three.) Selected Answer • Performance • Scalability • Manageability Correct • Performance • Scalability • Manageability Which two statements are true in regards to design proposals? (Choose two.) Selected Answer • You should create the logical design before the physical design. • You should keep your design proposal as simple as possible. Correct • You should create the logical design before the physical design. • You should keep your design proposal as simple as possible. Which two statements are true in regards to design proposals? (Choose two.) Selected Answer • Security should be considered throughout the design process. • You design proposal should be clearly documented. Correct • Security should be considered throughout the design process. • You design proposal should be clearly documented. Which two statements are correct in regards to modularity in your network design? (Choose two.) Selected Answer • Modularity facilitates future growth and troubleshooting efforts. • Modularity provides hierarchical structure to your design. Correct • Modularity facilitates future growth and troubleshooting efforts. • Modularity provides hierarchical structure to your design. Which two statements describe business continuity? (Choose two.) Selected Answer • The prevention of interruption to mission-critical services. • The ability to reestablish full functionality quickly after a disaster. Correct • The prevention of interruption to mission-critical services. • The ability to reestablish full functionality quickly after a disaster. What are the last two steps of business continuity planning? (Choose two.) Selected Answer • test the plan • formulate the plan Correct • test the plan • formulate the plan Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.) Selected Answer • You should list all the functions and services in the network. • You should perform a business impact analysis. Correct • You should list all the functions and services in the network. • You should perform a business impact analysis. Which statements is true in regards to the Assess the Risks step of business continuity planning? Selected Answer • You should perform a risk assessment. Correct • You should perform a risk assessment. Which statements is true in regards to the Formulate the Plan step of business continuity planning? Selected Answer • You should develop a plan of action to mitigate the risks. Correct • You should develop a plan of action to mitigate the risks. An RFP response should include which three items (Choose three.) Selected Answer • A solution overview • technical specifications • Executive summary Correct • A solution overview • technical specifications • Executive summary Which two statements describe why the executive summary section of an RFP so important? (Choose two.) Selected Answer • It outlines the technical benefits of the proposed design. • It is likely to be read by all decision makers. Correct • It is an overview of Juniper's value proposition to the customer. • It is likely to be read by all decision makers. Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.) Selected Answer • It should contain the bill of materials. • It should contain the logical and physical topology design requirements. Correct • It should contain the bill of materials. • It should contain the logical and physical topology design requirements. What is the second step of the Juniper recommended executive summary structure of an RFP? Selected Answer • Identification of business benefits. Correct • Identification of business benefits. What should be the first item in your network design checklist? Selected Answer • A process for understanding the customer's business and technical goals. Correct • A process for understanding the customer's business and technical goals. What should be the third item in your network design checklist? Selected Answer • The steps for designing a network topology. Correct • The steps for designing a network topology. What should be the fourth item in your network design checklist? Selected Answer • A process for selecting protocols, address schemes, naming conventions, and so forth. Correct • A process for selecting protocols, address schemes, naming conventions, and so forth. What are two rules you should follow when writing an executive summary of an RFP? (choose two.) Selected Answer • Keep it short and simple. • Focus on organizational issues. Correct • Keep it short and simple. • Focus on organizational issues. You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) Selected Answer • Redundant power supplies for network devices. • Virtual Chassis for EX devices. Correct • Redundant power supplies for network devices. • Virtual Chassis for EX devices. You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) Selected Answer • Chassis clusters for firewall platforms. • Stateless failover for firewall platforms. Correct • Stateful failover for firewall platforms. • Chassis clusters for firewall platforms. In which two situations does a backup WAN link with another provider make sense in a network design? (Choose two.) Selected Answer • When the users in the network rely on communication through VoIP. • When the cost of a second link is less than the cost of downtime. Correct • When the users in the network rely on communication through VoIP. • When the cost of a second link is less than the cost of downtime. In which two situations does physical device redundancy make sense in a network design? (Choose two.) Selected Answer • When downtime is not acceptable for device upgrades. • When zero impact to users and applications is required during device failures. Correct • When downtime is not acceptable for device upgrades. • When zero impact to users and applications is required during device failures. You have designed a network in which all network devices have redundant power supplies. However, the redundant power supplies are plugged into a single power source. Which two statements are true? (Choose two.) Selected Answer • The power redundancy requirements are not met as the single source of power could fail and the network devices will not stay powered on. • The redundant power supplies should be plugged into separate power sources. Correct • The power redundancy requirements are not met as the single source of power could fail and the network devices will not stay powered on. • The redundant power supplies should be plugged into separate power sources. What are two benefits of VRRP? (Choose two.) Selected Answer • open standards protocol • provides redundancy through a virtual IP address Correct • open standards protocol • provides redundancy through a virtual IP address You are attempting to form a chassis cluster with an SRX340 and an SRX345 but the chassis cluster formation is failing. Why is the chassis cluster failing to properly form? Selected Answer • The SRX model numbers must be the same to form a chassis cluster. Correct • The SRX model numbers must be the same to form a chassis cluster. Which two statements are true regarding chassis clustering? (Choose two.) Selected Answer • The chassis cluster uses a fabric link between the two nodes. • The chassis cluster nodes can be located in different cities. Correct • The chassis cluster uses a fabric link between the two nodes. • The chassis cluster nodes can be located in different cities. Which statement is true in regards to VRRP? Selected Answer • The VRRP members can contain two different routing platforms. Correct • The VRRP members can contain two different routing platforms. Which statement is true in regards to VRRP? Selected Answer • The maximum number of routing devices in a VRRP group is two. Correct • The maximum number of routing devices in a VRRP group is two. Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) Selected Answer • You need to include hardware redundancy in your design. • You must include highly available redundant connections for all applications in your design. Correct • You need to include hardware redundancy in your design. • You must include highly available redundant connections for all applications in your design. Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) Selected Answer • You need to include network redundancy in your design. • You need to include redundant wireless access points in your design. Correct • You need to include network redundancy in your design. • You need to include redundant wireless access points in your design. You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables. What is the maximum distance between the Ethernet switches? Selected Answer • 100 meters Correct • 100 meters Which two statements are true when determining the size and scope of a new network design? (Choose two.) Selected Answer • The type of devices is important. • The number of users is important. Correct • The type of devices is important. • The number of users is important. You have been tasked to determine the capacity and scaling of systems for a campus switching design. Which two statements are true? (Choose two.) Selected Answer • The average bandwidth usage of users. • The average number of wireless devices that will be connecting to the network. Correct • The average bandwidth usage of users. • The average number of wireless devices that will be connecting to the network. You must design a network for a large campus building with many users who are in different departments. Which technology should you use for your design? Selected Answer • VLAN Correct • VLAN You are designing a network design in which access between different groups must be tightly restricted. What should you do to accomplish this task? Selected Answer • A Layer 4 firewall Correct • A Layer 4 firewall Connectivity issues have been seen by the users in remote offices when attempting to access resources at the corporate headquarters. You must design a fix for this issues. Which technology should you include in your design? Selected Answer • redundant WAN links Correct • redundant WAN links You customer currently has a hub-and-spoke VPN but has seen that the forwarding capabilities of the hub device being overwhelmed during times of high traffic between spoke devices. Also, due to recent cutbacks, the IT staff is already overwhelmed. What should you recommend as a solution? Selected Answer • Replace the hub-and-spoke VPN with an ADVPN. Correct • Replace the hub-and-spoke VPN with an ADVPN. You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely. Which technology would you recommend? Selected Answer • SSL VPN Correct • SSL VPN Which Junos Space application can be used to manage VLANs on EX devices? Selected Answer • Network Director Correct • Network Director Which Junos Space application can be used to store and manage events for SRX devices? Selected Answer • Security Director: Logging and Reporting Correct • Security Director: Logging and Reporting In regards to a Junos Space deployment, which two statements are true? Selected Answer • Junos Space typically uses the eth0 interface to manage devices through the OOB network. • Junos Space typically uses the eth3 interface to manage devices through the in-band network. Correct • Junos Space typically uses the eth0 interface to manage devices through the OOB network. • Junos Space typically uses the eth3 interface to manage devices through the in-band network. Junos Space Security Director is an example of which type of network management solution? Selected Answer • centralized Correct • centralized Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario. What would you recommend? Selected Answer • Deploying a Data Center Interconnect. Correct • Deploying a Data Center Interconnect. Which Junos Space application can be used to manage L3 VPNs on MX devices? Selected Answer • Connectivity Services Director Correct • Connectivity Services Director You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn't require STP. Which technology can you recommend to the customer? Selected Answer • Virtual Chassis Correct • Virtual Chassis Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.) Selected Answer • VCF uses a spine-and-leaf architecture. • Each connected host in a data center is no more than two hops away from every other host in a data center. Correct • VCF uses a spine-and-leaf architecture. • Each connected host in a data center is no more than two hops away from every other host in a data center. Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI? (Choose two.) Selected Answer • GRE • EVPN Correct • GRE • EVPN Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer • VPLS • VRRP Correct • VPLS • VRRP Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer • RSVP • LDP Correct • RSVP • LDP Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) Selected Answer • ISIS • LACP Correct • ISIS • LACP Which data-interchange format is used to automate JUNOS? Selected Answer • JSON Correct • JSON Which automation tool can you use to automate Junos OS platforms? Selected Answer • PyEZ Correct • PyEZ Which two statements properly describe Junos operational scripts? (Choose two.) Selected Answer • A Junos operational script can be executed manually. • A Junos operational script can be executed automatically when a user logs in. Correct • A Junos operational script can be executed manually. • A Junos operational script can be executed automatically when a user logs in. Which two statements properly describe Junos event policies? (Choose two.) Selected Answer • You can execute Junos OS operational command for the action of an event policy. • An event policy uses if-then-else logic. Correct • You can execute Junos OS operational command for the action of an event policy. • An event policy uses if-then-else logic. Which two statements properly describe Junos event scripts? (Choose two.) Selected Answer • Junos event scripts are triggered automatically. • Junos event scripts can be used to monitor the overall status of the device. Correct • Junos event scripts are triggered automatically. • Junos event scripts can be used to monitor the overall status of the device. Which two statements properly describe Junos commit scripts? (Choose two.) Selected Answer • When a candidate configuration is committed, all active commit scripts are used. • Junos commit scripts cannot enforce custom configuration rules. Correct • When a candidate configuration is committed, all active commit scripts are used. • Junos commit scripts can enforce custom configuration rules. Which automation tool can you use to automate Junos OS platforms? Selected Answer • Chef Correct • Chef