Which two statements about a three-stage Clos IP Fabric architecture are correct? (Choose two.)
Answer : C, D
You are asked to deploy data classification measures in your network. You are analyzing an e-mail and notice several employees in the cc list but the e-mail does not appear to contain any sensitive data, such as security logs or financial reports.
In this scenario, how should this data be classified?
Answer : D
Click the Exhibit button.
Referring to the exhibit, which two statements are true? (Choose two.)
Answer : B, C
You are asked to design security policies based on team membership.
Which access control methodology should you use in this scenario?
Answer : B
Which data center architecture is open, flexible, and uses Layer 3 only?
Answer : B
You must implement Layer 4 security services between VMs that are hosted on the same server You require a low footprint with Docker support In this scenario, which Juniper Networks product would you deploy?
Answer : C
You want to encapsulate Layer 2 frames for transport across a Layer 3 network.
Which three methods are supported by Juniper Networks to accomplish this task? (Choose three)
Answer : A, C, E