Which two statements are true regarding a Virtual Chassis? (Choose two.)
Which three steps are part of business continuity planning? (Choose three.)
Which three QUESTION NO:s should be asked when performing a business impact analysis? (Choose three.)
Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network
switches to block a threat in real time?
A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute.
Which Junos automation tool would accomplish this task?
Which component triggers the quarantine of an infected endpoint?
What are three components used to enforce 802.1X in your design? (Choose three.)
You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to
have direct adjacencies between your remote sites.
Which two solutions would meet the requirements? (Choose two.)
You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network.
Which Juniper Networks product will accomplish this task?