When discussing network reliability, what does the term "five nines" mean?
A. The network is up 99.999% of the time.
B. The network is up .99999% of the time.
C. The network is up 9.9999% of the time.
D. The network is up .09999% of the time.
You are performing a risk assessment for a network design. Which statement is true in this scenario?
A. Some risks can be safely ignored.
B. The likelihood of a risk occurring should not be considered.
C. A network must be designed for an uptime of five nines.
D. All identified risks must have a mitigation plan in place.
Why would you recommend Junos Space Security Director in a network design?
A. It simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks.
B. It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.
C. It helps administrators to more quickly and intuitively manage all phases of a security policy life cycle.
D. It provides detection, isolation, and resolution of network faults and incidents.
What are three types of automation scripts used on a Junos device? (Choose three.)
A. op scripts
B. commit scripts
C. boot scripts
D. event scripts
E. control scripts
You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave
the local network.
Which Juniper Networks product will accomplish this task?
A. UTM
B. Sky ATP
C. JATP
D. SDSN
When implementing a top-down design methodology, where would you begin collecting information to start the design process?
A. the CEO of the corporation
B. the Application Layer of the OSI model
C. the currently-owned network equipment
D. the WAN edge
What are two phases of assessment when designing network security? (Choose two.)
A. to layout a logical design
B. to layout a physical design
C. to identify requirements
D. to perform data analysis
You are asked to secure the routing engine of all Junos devices in your design. The design should not
affect transit traffic.
Which action will accomplish this task?
A. Use a firewall filter on a revenue port.
B. Use a firewall filter on the loopback interface.
C. Use a firewall filter on the fxp0 interfaces.
D. Use a firewall filter on the management interface.
Which three steps are part of business continuity planning? (Choose three.)
A. Assess the risks.
B. Know your staff.
C. Know your network.
D. Understand your tools.
E. Test the plan.
What are two main elements of a network design RFP? (Choose two.)
A. business requirements
B. staffing requirements
C. e-waste requirements
D. environmental requirements