Click the Exhibit button.
Referring to the exhibit, which two statements are true? (Choose two.)
A. The vSRX is performing microsegmentation.
B. The vSRX is working in routed mode.
C. The vSRX is not performing microsegmentation.
D. The vSRX is working in transparent mode.
You are designing an EVPN/VXLAN overlay network for your data center. You are planning on reusing some of your existing devices that do not support VXLAN routing.
Which gateway model should be deployed to support this architecture?
A. spine gateway
B. leaf gateway
C. server based gateway
D. underlay gateway
When considering environmental conditions in a data center, which two statements are correct? (Choose two.)
A. The device air intake should face the cold aisle.
B. Relative humidity that is too low can cause water condensation.
C. Device exhaust fans should face the cold aisle.
D. The temperature should be measured at multiple heights.
Click the Exhibit button.
After several design meetings with the WAN team, EVPN MPLS will be deployed as the Data Center Interconnect protocol.
What should be enabled on the MX Series routers to support transporting traffic between DC-A and DC-B as shown in the exhibit?
A. OVSDB
B. stitching
C. fragmentation
D. CGNAT
Click the Exhibit button.
Which two statements about the redundancy design shown in the exhibit are true? (Choose two.)
A. User traffic must be policy-routed to the active data center.
B. Multicast IP addressing is in use.
C. Inter-server traffic must use an alternate IP address.
D. Anycast IP addressing is in use.
Which two statements describe CoS? (Choose two.)
A. CoS does not perfect sensitive traffic flows.
B. CoS can be used to differentiate traffic for different customers.
C. CoS creates an end-to-end guaranteed bandwidth reservation.
D. CoS does not create additional bandwidth.
What are two overlay protocols that should be considered in your data center design when using an IP fabric underlay? (Choose two.)
A. OSPF
B. VXLAN
C. MPLSoGRE
D. VPLS
According to Juniper Networks, what are two recommendations for implementing data center security? (Choose two.)
A. Perimeter security in a data center is normally performed on virtual devices.
B. Perimeter security in a data center is normally performed on physical devices.
C. DDoS protection is implemented at the perimeter of the data center.
D. DDoS protection is implemented at the core of the data center.
You are inspecting a small data center your company just purchased. You notice several blank panels and cable management system components in a storage room that are not installed on the equipment racks. In this scenario, which two statements would you include in your inspection report? (Choose two.)
A. The blank panels were removed to improve cooling air flow through the racks.
B. The cable management system function is cosmetic only and is not necessary.
C. The cable management system should be installed as soon as possible.
D. The blank panels should be installed as soon as possible.
What are two considerations when designing an IP fabric? (Choose two.)
A. Every leaf node should have an uplink to every spine node.
B. Leaf nodes and spine nodes should be the same type of device.
C. Uplinks from servers to the leaf nodes should be 40GbE links.
D. All spine nodes should be the same type of device.