Download as pdf
Download as pdf
You are on page 1of 92
Home / Juniper / Design, Associate (JNCDA) / Juniper JNO-1102.v2022-01-13.q92 / Ques Question 1/92 What should be the second item in your network design checklist? O A.Aprocess for selecting protocols, address schemes, naming conventions, and so forth O B.A validation process for analyzing customer's existing environment © C. The steps for designing a network topology. © D.Aprocess for understanding the customer's business and technical goals. PERE Chr Correct Answer: B Home / Juniper / Design, Associate (JNCDA) / Juniper.JNO-1102.v2022-01-13.q92 / ( Which two statements describe business continuity? (Choose two.) A. Manually turing on a backup server after a disaster. © B. The ability to reestablish full functionality quickly after a disaster. © C. Manually loading previously backed up data. C.D. The prevention of interruption to mission-critical services. Dee eran er Correct Answer: B,D SSOCIAtE ( A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute. Which Junos automation tool would accomplish this task? © A. JSNAPy O B. JET © C. event scripts © D.REST Explorer Dee ec Cr Correct Answer: B Home | Juniper / Design, Associate (JNCDA) / Juniper.JNO-1102.v2022-01-13.q92 / Questior What are two aspects of greenfield projects? (Choose two.) ‘A. New networks with few or no restraints to consider. CB. Next-generation networks created from the ground up. © €. Legacy applications that are no longer used. CD, Old equipment that should be replaced. PCCM Se nt Cis Correct Answer: A,B Home Juniper What information is included in an RFP issuance? Design, Associate (JNCDA) / Juniper.JNO-1102.v2022-01-13.q92 O A. product features © B. design requirements ) C. product positioning > D. COGS pricing COU secure Correct Answer: B —_ Which three questions should be asked when performing a business impact analysis? (Choose three.) A. How long could an outage be sustained? C B. Which functions and services are critical to the company's survival? © C. Whats the replacement cost of the core switches? D. How many redundant data paths are there? CE. Whatis the cost of both partial and full outages? Denese Ln Correct Answer: A,B,E Home / Juniper / Design, Associate (JNCDA) / Juniper.JNO-1102.v2022-01-13.q92 / Question 7 You are designing a network design in which access between different groups must be tightly restricted. What should you do to accomplish this task? O A.ALayer 3 switch © B.ALayer 4 firewall © C.ALayer 2 switch © D.ALayer 7 IDP COU Sc Urey Correct Answer: B (263 Q&As Dumps, 30%OFF Special Discount: freecram) Your company's network consists of your headquarters location plus several dozen remote offices. Remote office users are often unable to access data housed in the headquarters data center due to connectivity issues. You must update the network to provide reliable access to corporate assets for remote office users. Which technology is critical to your design project? © A. WAN acceleration te © B.Qos O C. IPsec © D. WAN aggregation What is the cost-effective cable solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters)? © A. single-mode fiber © B.UTP > C. power cable © D. multimode fiber BIE SO CUS Correct Answer: D out MDIX. You want to use standard cabling instead of crossover cabling in an environment wit In which two situations would this apply? (Choose two.) © A. switch-to-switch CB. server-to-switch C. computer-to-computer © D. computer-to-switch CUS Correct Answer: B,D Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.) A. You should list all the functions and services in the network. OB. You should perform a risk assessment, CC. You should perform a business impact analysis. D. You should develop a plan of action to mitigate the risks. DICED SS CUCU Correct Answer: A,C What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.) A. 008 provides more reliable management access. © B. 008 provides increased network security. CC. 008 frees up network bandwidth on campus switches. CD. 008 allows the use of Telnet as a management protocol CE. 008 is more cost-effective when purchasing equipment. Hide answers/explanations Correct Answer: A,B,C = ity Which statements is true in regards to the Formulate the Plan step of business coi planning? © A. You should list all the functions and services in the network. © B. You should perform a risk assessment. © C. You should develop a plan of action to mitigate the risks. D. You should perform a business impact analysis. Dee nec Ln Ci Correct Answer: C Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario. What would you recommend? © A. Deploying centralized management. © B. Deploying decentralized management. © ©. Deploying a Data Center Interconnect. © D, Deploying dual uplinks to separate ISPs. DIELS CUE CCL Correct Answer: C = What are three industry best practices for configuration management? (Choose three.) A. Use the rollback feature frequently. B. Back up all of the configurations frequently CO C. Use descriptive fields in device configurations. D. Use a central logging server. CE. Define a consistent device naming convention. De ey Cr Correct Answer: B,C,E When analyzing customer requirements, what are three of the categories that customer requirements can be organized into? (Choose three.) C2 A. Manageability CO B. Scalability O C. Edge D. Performance DICED SS CUCU CL Correct Answer: A,B,D Question 17192 Ea ES | . Exhibit: | jf Grou Co) | Q] om Be WY Group-C | Ag 1 Refering to the exit, which wo statements are correct in regards to VRRP? (Choose to.) (A. You tou se VRRP on the SR dvs forusesin Grou (1B. Youshud se VRRP onthe SR devas to WAN comecions | (You shoud se VRP on the SX devices ferusesin Grup 8 (0D. You shuld se VRP one SRK daves fr uses in Group te nest | | Comeetnsr:A,C Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) A. You need to include hardware redundancy in your design. © B. You must include highly available redundant connections for all applications in your design. C. Wire-line reliability is not necessary for the wireless clients in your design. D. Redundancy of wireless access points in unnecessary in your design. DO ea er Correct Answer: A,B Question 19/92 (263 Q&As Dumps, 30%OFF Special Discount: freecram) Which data-interchange format is used to automate JUNOS? O A. Visual Basic © B.YAML O C. JavaScript © D. Pascal Correct Answer: B (263 Q&As Dumps, 30%OFF Special Discount: freecram) Which two statements are true regarding a Virtual Chassis? (Choose two.) C A.A Virtual Chassis must be configured on the same series but not the same model (B.A Virtual Chassis supports up to 10 participating devices. O C.A Virtual Chassis supports only two participating devices O D.A Virtual Chassis can be configured on mixed series and models. Dee nee Cn Correct Answer: B,D Your campus network is rolling out a BYOD policy. Your design must ensure that guest users are restricted from accessing internal network resources. Which two actions would solve this problem? (Choose two.) © A. Guest users should be placed in an isolated guest VLAN. CB. Guest users should be placed in an isolated guest routing instance. C. Guest users should be placed in @ non-isolated quest VLAN. CD. Guest users should be placed in a non-isolated guest routing instance. Dees nr Correct Answer: A,B (263 Q&As Dumps, 30%OFF Special Discount: freecram) What type of device can be installed to increase a broadcast domain? O AIDS O B. switch © ¢. router O DIPS Correct Answer: B (263 Q&As Dumps, 30%OFF Special Discount: freecram) You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) © A. Redundant firewall filters for firewall platforms. B. Stateful failover for firewall platforms. CO C. Stateless failover for firewall platforms. © D. Chassis clusters for firewall platforms PICU SO CUCL Correct Answer: B,D (263 Q&As Dumps, 30%OFF Special Discount: freecram) Which two statements properly describe Junos commit scripts? (Choose two.) CO A. When a candidate configuration is committed, only the first active commit script is used. B. When a candidate configuration is committed, all active commit scripts are used. © C. Junos commit scripts cannot enforce custom configuration rules. CD. Junos commit scripts can enforce custom configuration rules DICE DOCS CUn uy Correct Answer: B,D (263 Q&As Dumps, 30%OFF Special Discount: freecram) What are two rules you should follow when writing an executive summary of an RFP? (choose two.) CA. Canned responses are ok to use. O B. Give a history of Juniper Networks. C. Keep it short and simple. CD. Focus on organizational issues. COP US SUC Correct Answer: C,D (263 Q&As Dumps, 30%OFF Special Discount: freecram) What is the second step of the Juniper recommended executive summary structure of an RFP? O A. Identification of business benefits. © B. Relevant supporting information outlining why the customer should choose your plan © C. Overview of your proposed solution. © D. Introduction of the customer's need or problem COU Sur Correct Answer: A Your corporate campus consists of a single large building with several thousand users. Functional groups are each located in a separate area of the building with their proprietary data hosted locally. Some communication occurs between the various groups and must be tightly restricted. Which technology should be used to accomplish this task? O A. router © B. firewall > C. intrusion prevention system © D. switch DRS Ln Correct Answer: B You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure. Which statement is true about the proposed solution? C A, IPsec can require MTU modifications to accommodate the additional overhead. © B. Packets that are passed through an IPsec tunnel are not encrypted. © C. IPsec tunnels will require an MPLS infrastructure through the WAN © D. IPsec packets can be fragmented once encrypted. DO car e r CS Correct Answer: A (263 Q&As Dumps, 30%OFF Special Discount: freecram) Which statement describes brownfield deployments? © A. Brownfield deployments use all new equipment. ) B. Brownfield deployments allow for more modular and scalable design than greenfield deployments. © C. Brownfield deployments are considered more expensive than greenfield deployments. © D. Brownfield deployments are commonly used and can be restrictive. Dene Cn Correct Answer: D (263 Q&As Dumps, 30%OFF Special Discount: freecram) What are two phases in Juniper's lifecycle approach when designing a network? (Choose two.) A. buy O B. build C. plan OC D. oversee Correct Answer: B,C In your network design, you must ensure that all user sessions passing through an SRX Series device remain active if there is a device failure. Which mechanism will accomplish this design requirement? O A. Virtual Chassis © B.MC-LAG © ¢. VRRP. O D. chassis clustering Dee eee rT Cn Correct Answer: D Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution. - Which two statements describe how you would meet the business managers’ objectives? (Choose two.) h © A. Ensure that the solution provides a high quality experience for the user. B. Ensure that the solution is cost effective. CC. Ensure that the solution is easy to manage for the IT staff. (© D. Ensure that the solution is easy to use for the end user. PICU SO CUCL Correct Answer: A,D What should be included in a network design to improve resiliency? O A. redundant power supplies © B. in-band management © C. out-of-band management O D. climate control systems DO Cnr Cs Correct Answer: A What are three examples of physical security? (Choose three.) C A. security cameras B. intrusion detection and prevention O €. man in the middle CD. access door keypads E. a mantrap DOD car e Cr s Correct Answer: A,D,E Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI? (Choose two.) © A.GRE > B. EVPN © ¢. OSPF © D.RSTP b DIEU SO CUS Correct Answer: A Network Director is an example of which type of network management application? © A.op script O B.on-box © C. centralized © D. out-of-band DCO D eee Crt Cis bh Correct Answer: C = You are asked to provide a design proposal for an enterprise customer that currently has a three- tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers. In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.) A. The overall network performance is increased. D B. The total number of devices is increased. CC. The number of connections between devices is decreased, D. The number of protocols used is decreased, DO near Chr Correct Answer: A,C What are two valid reasons to implement a network management solution within your network Infrastructure? (Choose two.) © A. to reduce network operating expenditures B. to eliminate the need for network planning CO C. to reduce network capital expenditures O D.to increase network visibility b PICU SO TCLS Correct Answer: A,D Which two statements are true about separating production and management networks? (Choose two.) A. Separation complicates data collection CD B. Separation increases bandwidth contention. © C. Separation eliminates bandwidth contention. O D. Separation simplifies data collection. DO ear eC Lr Correct Answer: A,C Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.) O A.e-mail CB. voice over IP (VoIP) C. video conferences O D. customer relationship management (CRM) Deena Chr Correct Answer: B,C Which solution would ensure that voice traffic is treated with a higher priority than data traffic throughout a network? © A. 802.10 VLAN tags © B. link aggregation © ©. routing instance © D. class of service DEUS SO TC UC Correct Answer: D You are asked to develop a high-level design to meet a customer's requirement to transition an aging switched infrastructure to a newer approach, meeting their needs for the next five years. In your presentation to the IT department, which three areas are important to define? (Choose three.) A. recommendations for IGP timers CB. business costs of not going forward CC. impact to the business from an operations perspective D. configuration stanza for class of service definition CE. cost of the proposed solution Dee eae er Correct Answer: B,C,E What does the network MTTR measure? © A. the length of time it takes to reboot the network devices © B. the length of time to build the network © C. the length of time it takes to design the network © D. the length of time to repair the network Correct Answer: D You are consulting on the redesign for a large retail network. The customer has dozens of locations, all connected to a central data center. Which two requirements would you expect from you customer? (Choose two.) A. distributed network management B. very high throughput at every location O C- resiliency to ensure continuous operation D. WAN aggregation using Internet-based VPN PCCM een LET Cis Correct Answer: C,D Which two statements properly describe Junos event policies? (Choose two.) A. An event policy uses for-loop logic. CB. You can execute Junos OS operational command for the action of an event policy. O C. You cannot execute Junos OS operational command for the action of an event policy. 7 D. An event policy uses if-then-else logic. Dee er CS Correct Answer: B,D Question 46/92 Exhibit: Pe eee ers Referring to the exhibit, what should you do to increase high availability in the network? © A. Make a connection between each core switch. O B. Make a connection between each access switch. © C. Connect each server to two access switches. by CO D. Increase the number of connections between the core and access switches. (ETAT god) Correct Answer: C (263 Q&As Dumps, 30%OFF Special Discount: freecram) Which two items are key RFP elements? (Choose two.) A. Logical design requirements O B. Physical design requirements C, Modular requirements CD. Connectivity and throughput requirements Correct Answer: C,D Junos Space Security Director is an example of which type of network management solution? O A. event script © B. op script © C. centralized © D. on-box DO Cnr Cs Correct Answer: C Question 49/92 a Exhibit: Referring to the exhil it, which two statements are correct in regards to VRRP? (Choose two.) 1 A. You can use VRRP on the SRX devices to WAN connections. () B. You can use VRRP on the SRX devices for users in Group-B. (J C. You can use VRRP on the SRX devices for users in Group-A. _) D. You can use VRRP on the SRX devices for users in Group-C. PCC Ces dE Uric cy Correct Answer: A,B Your customer has deployed Juniper devices and network devices from other vendors in their network. They would like you to propose a data correlation and logging solution that will work with Juniper devices, as well as the network devices from the other vendors in their network. Which solution would you propose in this situation? © A. Secutity Director: Logging and Reporting >) B. Connectivity Services Director © ©. Juniper Secure Analytics © D. Contrail Cloud DU CUO Correct Answer: C You have been tasked to determine the capacity and scaling of systems for a campus switching design. Which two statements are true? (Choose two.) © A. The average number of wireless devices that will be connecting to the network B. The average bandwidth usage of users. C. The number of remote workers. CD. The number of guest users. DUO CLC Correct Answer: A,B An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6? O A. Unicast © B. Broadcast © ©. Anycast © D. Multicast ide answers/explanations b Correct Answer: C You customer has had troubles in the past with his STP implementations and has asked you to. design a Layer 2 network that doesn't require STP. Which technology can you recommend to the customer? © A. IPsec © B.VSTP O ©. Virtual Chassis © D. VLANs b CUS Correct Answer: C You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) CA. Redundant power supplies for network devices. B. SFP interfaces. C. Virtual Chassis for EX devices. 0 D. High bandwidth uplink. Hide answers/explanations Correct Answer: A,C You are asked to provide a design proposal for a data center environment. As part of your solution, you are asked to simplify the management of the ToR EX Series switches. In this scenario, which solution will accomplish this requirement? O A. VRRP © B.MC-LAG © ©. Virtual Chassis O D. Clos fabric DO near er Correct Answer: C Question 56/92 Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API? O A.JET © B.JSNAPy O ©. PyEZ © D.REST Explore Correct Answer: C Deena en Ca Which three critical design blocks or functional areas benefit from HA design solutions? (Choose three.) 0 A. WAN B. data center I O ©. collocation D. campus OC E. home office Correct Answer: A,B,D You are the network administrator for a large university, and are ready to upgrade your network. You want to solicit multiple vendors for design suggestions to help you define your plan moving forward. Which two methods should you employ? (Choose two.) ‘A. Require your reseller to submit a BOM. CB. Publish an RFI to key vendors © €. Publish an RFP to key vendors. CD. Attend industry conferences. DORI ne ur tC Correct Answer: B,D. Which two statements are true in regards to network capacity planning? (Choose two.) A. The network management platform is important. CB. The application behavior is not important. © C. The application behavior is important. rn D. The network management platform is not important. PCCM Cn ne nt Cis Correct Answer: C,D Your corporate network is located in a single, multifloor building. Several smaller, remote buildings connect into your main corporate network. Which topology describes your network? O A. data center O B. hub-and-spoke O C. campus & © D. fullmesh DCO D eee Crt Cis Correct Answer: B Which name is used by a service provider to identify the edge device inside the central office facing the customer? bh © APE OBP © ¢.CE © D.LSR BEE SO CLC Correct Answer: A Which Junos Space application can be used to manage L3 VPNs on MX devices? © A. Security Director © B. Log Director © C. Network Director © D. Connectivity Services Director Dee Dern en Cis Correct Answer: D ‘SRX Series devices support which type of HA feature? O A. chassis clustering O B. Virtual Chassis © C. logical systems © D.HSRP COU Secures Correct Answer: A Question 64/92 Which component triggers the quarantine of an infected endpoint? © A.ALG O B. Policy Enforcer © ¢. switch O D. firewall Correct Answer: B COU cUC ey Which two groups within the IT organization will likely need training if a new type of network equipment is deployed throughout the enterprise? (Choose two.) O A.systems administrators B. network operations CC. network engineering © D. application development PIU CULT Correct Answer: B,C What are two main elements of a network design RFP? (Choose two.) O A- environmental requirements C B. staffing requirements O C. e-waste requirements b D. business requirements PCCM Cn na ar Cis Correct Answer: A,D What is an example of a port-based network access control protocol? O A.802.1r O B.802.3x © €.802.1q © D.802.1x COU eure Correct Answer: D What are two aspects of brownfield projects? (Choose two.) A. Old equipment that should be replaced. CB. Legacy applications that are no longer used. © C. New networks with few or no restraints to consider. © D. Next-generation networks created from the ground up. De ec en Ct Correct Answer: A,B You must design a network for a large campus building with many users who are in different departments. Which technology should you use for your design? © A.RIP © B.GRE © ¢.BGP © D.VLAN COEDS cures Correct Answer: D As part of your automation design, you need an off-box system that will be able to monitor telemetry information. You must then use that information to dynamically update devices as needed to ensure optimal network traffic flow. Which automation solution would accomplish this goal? O A.Chef © B. SaltStack O C. Puppet & © D. Ruby Deer Cn Correct Answer: C What are three components of an RFP? (Choose three.) C A. a list of available IP addresses within their current IP allocation B. a list of design requirements C C. alist of devices to meet the design requirements ) D. the types of solutions that the design must include C E. general information about the existing network environment Dee en Correct Answer: B,D,E In a bring-your-own-device deployment, where would non-authenticated users be placed? © A.S-VLAN O B.C-VLAN © €. guest VLAN © D. production VLAN DOE D eC ea Lr Cis Correct Answer: C Which two statements are true regarding chassis clustering? (Choose two.) & © A. The chassis cluster uses an FXPO link between the two nodes. ) B. The chassis cluster uses a control link between the two nodes. C. The chassis cluster must contain two identical MX Series devices. D. The chassis cluster must contain two identical SRX Series devices. BEES CULT Correct Answer: B,D What are the three phases of the Juniper lifecycle service approach? (Choose three.) 0 A.Plan OC B. Migrate 0 ¢. Build D. Operate PCCM Cn na ar Cis Correct Answer: A,C,D You are asked to deploy VPNs in your network. What are two deployment models you would use? (Choose two.) © A. hub and spoke O B. overlay C. site to site O D. hierarchical Deena Chr Correct Answer: A,C In an SRX Series environment, what would you use to manage your network's firewall policy? O A. Virtual Director B. Network Director O C. Security Director O D. Services Activation Director DCO D ern eer Cis Correct Answer: C What are two reasons why you would send an RFP to multiple vendors (Choose two.) A. to satisfy international law requiring a minimum of three vendors CO B. to warranty the process against fraud © C. to eliminate vendors who cannot meet the requirements OD. to compare competing proposals is Deen ET CS Correct Answer: C,D You are performing a risk assessment for a network design. Which statement is true in this scenario? A.All identified risks must have a mitigation plan in place. © B. Some risks can be safely ignored. © C. The likelihood of a risk occurring should not be considered. © D.Anetwork must be designed for an uptime of five nines. Hide answers/explanations Correct Answer: B What is the forth step of the Juniper recommended executive summary structure of an RFP? © A. Identification of business benefits. © B. Introduction of the customer's need or problem © C. Overview of your proposed solution. © D. Relevant supporting information outlining why the customer should choose your plan COU Sur Correct Answer: D In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.) OC A. core B. access OC. WAN edge © D. aggregation BU CUS Correct Answer: B,C The connectivity and throughput requirements RFP element contains which two items? (Choose two.) © A. Hierarchical design considerations B. Traffic analysis C. Number of wireless connections needed CD. Funetionality of each module within the design DIEU SO CUS Correct Answer: B,C Which statement describes a data center is right? © A. The data center encompasses a broad area that is used to interconnect business locations and resources. O B. The data center locally hosts thousands of users with wired connections, all with three to four active devices. C. The data center houses the computing resources and services used by a company. © D. The data center typically involves high density topologies with multiple points of access. Hide answers/explanations Correct Answer: C Which statement is true in regards to VRRP? © A. The maximum number of routing devices in a VRRP group is two. B. The maximum number of routing devices in a VRRP group is three © €. The maximum number of routing devices in a VRRP group is ten. © D. The maximum number of routing devices in a VRRP group is four. DCO D ern eer Cis Correct Answer: A What are three considerations for network capacity planning? (Choose three.) © A. number of users CB. network management platform C. user locations © D. application behavior E. security regulations PCCM Seen rT Cans Correct Answer: A,C,D (263 Q&As Dumps, 30%OFF Special Discount: freecram) Acompany asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device. Which three measurements do you need to satisfy the company's requirement? (Choose three.) CA. the number of guest access users B. the number of power over Ethernet ports CC. the number of physical desktop ports CO D. the number of unmanned IP enabled end-point systems the number of WLAN access points EO ELC Correct Answer: A,C,D On an SRX Series device, what are three match criteria of a security policy? (Choose three.) CO A. security zone OC B.Qo0s O C. MAC address b CO D.IP address E. application port DCE Uae nr Cs Correct Answer: A,D,E You are gathering information to determine capacity, density, and scaling of systems for a campus switching design. What information is critical to the design? (Choose three.) CA. the number of users with a fixed desktop station and attached IP phone © B. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS machines) © C. the number of guest users or contractors accessing with a mobile hot spot ® D. the number of users that are home office/mobile workers CE. the number of physical VoIP phones not connected to a desktop COU UC ey Correct Answer: A,B,E What are two important considerations with respect to the customer's IT organization which might affect your design? (Choose two.) © A. availability of funding to increase IT staffing CO B. availability of the IT telephone contact center O C. staff expertise levels in the technology under consideration & © D. reporting hierarchy of the IT support organization Deere Cnn Correct Answer: A,C You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) O A. bit level redundancy B. LAGs towards the LAN. O C. multiple physical uplinks by CO D. redundant REs for SRX devices. DICE USCS CUPL) Correct Answer: B,C A service provider has requested that you develop a design for a new network deployment focused on a call center customer. What are two success criteria from the stakeholder's point of view with respect to this network deployment? (Choose two.) A. requirement for secure data transmissions O B. multicast stream replication must follow MSDP path & CC. end user demand for low latency voice connections CD. easy deployment of the solution by the service provider DCO car e r Cs Correct Answer: A,C. A hospital has issued an RFP for a full network refresh. The RFP focuses on the users, applications, and bandwidth. Which two realistic assumptions would be inferred about this network? (Choose two.) A. Network downtime will not be tolerated. O B. Regulatory requirements must be considered. CO C. Quality of service (QoS) is not necessary. D. WiFi services must support video. DO ea er Correct Answer: A,B Question 92/92 What are two ways that a user's business model is important for network design purposes? (Choose two.) C A. Itallows the engineer to infer certain technical requirements. CB. It leads to customized application development, consulting requirements, or both. C. It suggests certain budgetary and scheduling constraints. © D. It shows which vendors the user prefers. Dee nec Ln Cs Correct Answer: A,C

You might also like