Juniper JN0-1103 Design, Associate (JNCIA-Design) Online Training
Juniper JN0-1103 Online Training
The questions for JN0-1103 were last updated at Nov 19,2024.
- Exam Code: JN0-1103
- Exam Name: Design, Associate (JNCIA-Design)
- Certification Provider: Juniper
- Latest update: Nov 19,2024
What are three components of an RFP? (Choose three.)
- A . general information about the existing network environment
- B . a list of devices to meet the design requirements
- C . a list of design requirements
- D . a list of available IP addresses within their current IP allocation
- E . the types of solutions that the design must include
Which name is used by a service provider to identify the edge device inside the central office facing the customer?
- A . LSR
- B . PE
- C . CE
- D . P
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows.
The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.
In this scenario, which type of security design would fulfill this requirement?
- A . a centralized security appliance
- B . a container-based security deployment
- C . a physical security device connected to each host
- D . an all-in-one virtual security device in each host
Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for which protocol?
- A . SNMP
- B . IPv6
- C . OSPF
- D . STP
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)
- A . WAN edge
- B . aggregation
- C . core
- D . access
What is the forth step of the Juniper recommended executive summary structure of an RFP?
- A . Identification of business benefits.
- B . Relevant supporting information outlining why the customer should choose your plan.
- C . Overview of your proposed solution.
- D . Introduction of the customer’s need or problem.
What are the three phases of the Juniper lifecycle service approach? (Choose three.)
- A . Operate
- B . Migrate
- C . Plan
- D . Build
Which solution ensures data security in this environment?
- A . Use PNAC on all inter-switch connections.
- B . Use LLDP on all inter-switch connections.
- C . Use LACP on all inter-switch connections.
- D . Use MACsec on all inter-switch connections.
Which two statements are true when determining the size and scope of a new network design? (Choose two.)
- A . The number of users is important.
- B . The number of users is not important.
- C . The type of devices is important.
- D . The type of devices is not important.
On an SRX Series device, what are three match criteria of a security policy? (Choose three.)
- A . MAC address
- B . IP address
- C . QoS
- D . security zone
- E . application port