You are asked to design security policies based on team membership.
Which access control methodology should you use in this scenario?
A.non-discretionary access control
B.role-based access control
C.mandatory access control
D.discretionary access control
Referring to the exhibit, which two statements are true? (Choose two.)
A.You should use CoS rewrite rules for traffic coming into the leaf devices.
B.You should use CoS rewrite rules for traffic leaving the leaf devices.
C.You should use CoS rewrite rules for traffic leaving the spine devices.
D.You should use CoS rewrite rules for traffic coming into the spine devices.
You are asked to deploy data classification measures in your network. You are analyzing an e-mail and notice several employees in the cc list but the e-mail does not appear to contain any sensitive data, such as security logs or financial reports.
In this scenario, how should this data be classified?
Which two statements describe SDN? (Choose two.)
A.SDN can alleviate the need for manually configuring each network device.
B.SDN moves forwarding functions to a centralized management platform.
C.SDN combines the control plane and the forwarding plane into a single fabric.
D.SDN moves compute intensive functions to a centralized controller.
Which two Layer 2 Data Center Interconnect redundancy options support active/active forwarding? (Choose two.)
Your company wants to expand operations and build small data centers in locations where it is difficult to maintain physical routing equipment. You must recommend a Juniper product that minimizes this issue.
Which product would you recommend in this situation?
Which protocol is used to exchange control information between the participating multichassis LAG (MC-LAG) peers?
You are developing an automation strategy and have been given the requirements below.
The tool chosen must be supported by multiple vendors. The tool chosen must not install a client on the networking devices. The tool chosen must support open standards communication methods.
Which tool satisfies the requirements?
You are in discussions with the WAN team about implementing a Data Center interconnect between DC-A and DC-B, as shown in the exhibit.
What are two protocols that would support your Data Center Interconnect requirements? (Choose two.)
A.Layer 3 VPN
You are designing an IP fabric ASN scheme using EBGP.
What are two acceptable ranges in this scenario? (Choose two.)
Your corporate network consists of four data centers. Your data centers are already running EVPN- VXLAN over an IP fabric. You are asked to design a strategy for Layer 3 data center interconnectivity.
Which two methods would satisfy this requirement? (Choose two.)
A.EVPN Type-6 routes
D.EVPN Type-5 routes
You are designing an EVPN/VXLAN overlay network for your data center. You are planning on reusing some of your existing devices that do not support VXLAN routing.
Which gateway model should be deployed to support this architecture?
C.server based gateway
You are asked to design a DCI that offers policy control, active/active multihoming with load balancing, and minimizes flooding of BUM traffic.
Which DCI implementation satisfies these requirements?
C.BGP Layer 2 VPN
Your company is deploying a private cloud based on OpenStack and has selected Contrail Networking as their SDN controller. As part of this solution, you must implement distributed firewall capabilities.
In this scenario, which Contrail component implements this function?
Given the physical layout of the data center shown in the exhibit, which two statements are correct? (Choose two.)
A.A single access tier exists for an entire row of servers.
B.Each rack is managed as a single unit within the data center.
C.Cable run lengths are minimized.
D.The layout requires minimal uplinks.
You are designing a QoS scheme for your data center. You must ensure lossless Ethernet.
What are three protocols that would be used in this scenario? (Choose three.)
Which two statements are correct when considering redundancy in a data center design? (Choose two.)
A.Virtual Chassis is not supported in IP fabric designs.
B.Routing protocols in an IP fabric must support ECMP.
C.Redundant power supplies should be wired to the same PDU.
D.LAG between a server and an IP fabric should be on separate physical leaf devices.
Which statement is correct about end-of-row (EoR) access switch designs when compared to top-of- rack (ToR) designs?
A.Large EoR designs provide more flexibility for connection types.
B.EoR designs require fewer cable connections to all servers.
C.EoR designs typically provide fewer access devices to manage.
D.Large EoR designs minimize the overall cable length required to connect to all servers.
Which two elements are available to implement security within a vRouter managed by Contrail? (Choose two.)
You need to ensure that no single point of failure exists in a new data center that will be deployed.
Referring to the exhibit, which two technologies will accomplish this requirement? (Choose two.)
You are designing a Layer 3 Clos fabric architecture for a new data center network infrastructure. You use IBGP for the underlay control plane of the fabric.
Which devices must support BGP route reflection and BGP ADD-PATH?
C.fabric interconnect routers
D.fabric perimeter routers
2021 Latest Braindump2go JN0-1302 PDF and JN0-1302 VCE Dumps Free Share: