Click the exhibit button. You are asked to provide a proposal for security elements in the service provider network shown in the exhibit. You must provide DDoS protection for Customer A from potential upstream attackers. Which statements is correct in…

Your network design consists of two chassis clusters with the same cluster ID. The reth0 interfaces of each cluster are connected to the same Layer 2 network. In this scenario, what will ensure uninterrupted traffic? A. One of the clusters…

You are designing a Log Director deployment that must be able to handle 9,500 sustained events per second. In this scenario, what is the minimum deployment solution? A. one JA2500 as a Log Collector B. three JA2500s as Log Collectors…

You are designing an enterprise WAN network that must connect multiple sites. You must provide a design proposal for the security elements needed to encrypt traffic between the remote sites. Which feature will secure the traffic? A. BFD B. OSPF…

An auditor reviewed your company’s firewall configurations and is requiring that IPsec VPN connections must not expose IKE identities during IKE negotiations. Which two methods satisfy this requirement? (Choose two.) A. Use main mode for the IKE policy. B. Use…

You are designing an IPsec VPN solution for a customer with the requirements shown below: -It must be scalable -It must support VoIP traffic with minimal latency -It must allow remote locations to be added to the VPN topology with…