Which protocol is used to exchange control information between the participating multichassis LAG (MCLAG) peers?
A. BGP
B. OSPF
C. ICCP
D. VCCP
Your corporate network consists of four data centers. Your data centers are already running EVPN-VXLAN over an IP fabric. You are asked to design a strategy for Layer 3 data center interconnectivity.
Which two methods would satisfy this requirement? (Choose two.)
A. EVPN Type-6 routes
B. L2VPN
C. L3VPN
D. EVPN Type-5 routes
You are asked to design a DCI that offers policy control, active/active multihoming with load balancing, and minimizes flooding of BUM traffic.
Which DCI implementation satisfies these requirements?
A. EVPN
B. circuit cross-connect
C. BGP Layer 2 VPN
D. VPLS LAG
You want to deploy chassis clustering to provide high availability on the SRX Series devices that are securing your data center.
In this scenario, which statement is correct?
A. GRES can provide high availability.
B. NSR can provide high availability.
C. MC-LAG can provide high availability.
D. The reth interfaces can provide high availability.
What are two reasons for using cRPD? (Choose two.)
A. SOHO
B. route reflector
C. cloud-native routing
D. core routing
You must implement Layer 4 security services between VMs that are hosted on the same server. You require a low footprint with Docker support.
In this scenario, which Juniper Networks product would you deploy?
A. vSRX
B. cRPD
C. cSRX
D. QFX
Which data center architecture is open, flexible, and uses Layer 3 only?
A. STP
B. IP fabric
C. virtual chassis
D. MC-LAG
You are designing a large IP fabric and must determine if you should use IBGP or EBGP to signal your underlay.
Which statement is correct in this scenario?
A. IBGP will require a full mesh on all devices.
B. IBGP will allow your network to scale to larger device numbers.
C. EBGP will require more BGP neighbors per device.
D. EBGP will require that an IGP is also configured.
You have a heavily virtualized environment in which all of your virtual machines are hosted on a few large, shared servers. For security reasons, you must restrict inter-VM traffic and only allow traffic that complies with your security policies.
Which two technologies would you use to restrict inter-VM traffic? (Choose two.)
A. URL filtering
B. security intelligence
C. vSRX
D. VLAN
Contrail Networking performs which three functions? (Choose three.)
A. Configure physical network functions.
B. Deploy bare metal compute devices.
C. Perform service chain network functions.
D. Configure storage components.
E. Virtualize networks.