Questions for the JN0-1302 were updated on : Oct 04 ,2024
Your data center design must ensure that no access switch can become a single of failure.
Which two actions will satisfy this requirement? (Choose two.)
A, C
Which two statements describe CoS? (Choose two.)
BC
Exhibit.
Referring to the exhibit, which two statements are true? (Choose two)
BD
Exhibit.
You are designing a data center where all your servers in each rack will be connected to two top-of-
rack (ToR) switches using Layer 2 as shown in the exhibit You must implement a high availability
solution that maintains link layer connectivity to each server when one of the ToR switches fails
in this scenario, which solution will accomplish this task?
D
You must design a data center (DC) connectivity solution for four data centers located in the US.
Europe, Africa, and China Which three statements are correct in this scenario? (Choose three)
BCD
Exhibit.
For a fully configured and functional IP fabnc underlay as shown in the exhibit, how many external
BGP neighbors are expected to be in the established state for Spine 1?
C
Which two characteristics describe a one-arm firewall deployment? (Choose two )
B, C
Within a customer's data center, one departmental server is transmitting all of its network traffic
marked with an IP precedence value of 6 The ingress switch must change this precedence before
forwarding it to the rest of the network.
Which CoS feature would be used to accomplish this task?
B
Which two Junos components does cRPD contain? (Choose two.)
BD
When using VPLS for a Data Center Interconnect, which statement about MAC learning is correct?
B
You want to protect a hypervisor in your data center with a security solution that is installed on the
hypervisor and provides firewall protection to applications Traffic to one of the virtual servers must
be subject to a NAT policy before communicating with the virtual server
Which two solutions would you use to satisfy this requirement? (Choose two.)
A, D
You are asked to create an underlay network that will scale from a small system to a large system and
can be integrated into a Contrail solution In this scenario, which protocol satisfies these
requirements'5
C
What are two elements of data center security? (Choose two.)
A, C
You must implement high availability features in the design for a data center. Every network device in
this part of the data center only has one routing engine. Which high availability feature should you
use in this scenario?
C
During a design requirements gathering meeting for a new data center, your customer indicates that
traffic to and from corporate HR systems is highly sensitive and mat the network design should
ensure that these systems are protected from unauthorized access
Which three design actions would satisfy this requirement? (Choose three.)
B, C, D