What are two phases in Juniper's lifecycle approach when designing a network? (Choose two.)
A. plan
B. build
C. buy
D. oversee
You are performing a risk assessment for a network design. Which statement is true in this scenario?
A. Some risks can be safely ignored.
B. The likelihood of a risk occurring should not be considered.
C. A network must be designed for an uptime of five nines.
D. All identified risks must have a mitigation plan in place.
What are two reasons why you would send an RFP to multiple vendors (Choose two.)
A. to eliminate vendors who cannot meet the requirements
B. to warranty the process against fraud
C. to satisfy international law requiring a minimum of three vendors
D. to compare competing proposals
Which three questions should be asked when performing a business impact analysis? (Choose three.)
A. What is the cost of both partial and full outages?
B. What is the replacement cost of the core switches?
C. Which functions and services are critical to the company's survival?
D. How many redundant data paths are there?
E. How long could an outage be sustained?
A customer wants to implement an automation system that can update BGP routes without commits and
can make hundreds of changes per minute.
Which Junos automation tool would accomplish this task?
A. REST Explorer
B. JSNAPy
C. JET
D. event scripts
Which two statements are true about a service-centric data center model? (Choose two.)
A. A service-centric data center model pools compute resources.
B. A service-centric data center model pools storage resources.
C. A service-centric data center model does not pool storage resources.
D. A service-centric data center model does not pool compute resources.
What are two main elements of a network design RFP? (Choose two.)
A. business requirements
B. staffing requirements
C. e-waste requirements
D. environmental requirements
What does the network MTBF indicate?
A. the speed of the network
B. the reliability of the network
C. the age of the network
D. the cost of the network