Exam4Training

Juniper JN0-1103 Design, Associate (JNCIA-Design) Online Training

Question #1

Which data-interchange format is used to automate JUNOS?

  • A . YAML
  • B . JavaScript
  • C . Visual Basic
  • D . Pascal

Reveal Solution Hide Solution

Correct Answer: A
Question #2

Which two statements describe business continuity? (Choose two.)

  • A . The prevention of interruption to mission-critical services.
  • B . The ability to reestablish full functionality quickly after a disaster.
  • C . Manually turning on a backup server after a disaster.
  • D . Manually loading previously backed up data.

Reveal Solution Hide Solution

Correct Answer: AB
Question #3

Which two statements describe why the executive summary section of an RFP so important? (Choose two.)

  • A . It is likely to be read by all decision makers.
  • B . It is an overview of Juniper’s value proposition to the customer.
  • C . It outlines the technical benefits of the proposed design.
  • D . It addresses the customer’s goals, scope, and requirements.

Reveal Solution Hide Solution

Correct Answer: AB
Question #4

What are two advantages of using an out-of-band (OOB) management network?

  • A . An OOB management network is more reliable than in-band management network.
  • B . An OOB management network is less reliable than in-band management network.
  • C . An OOB management network requires higher bandwidth requirements than in-band management network.
  • D . An OOB management network can function with lower bandwidth requirements than in-band management network.

Reveal Solution Hide Solution

Correct Answer: AD
Question #5

Which two industry standard automation platforms are used to provision Juniper data center switches? (Choose two.)

  • A . Python
  • B . Chef
  • C . OpenView
  • D . Tivoli

Reveal Solution Hide Solution

Correct Answer: AB
Question #6

What should be the third item in your network design checklist?

  • A . A validation process for analyzing customer’s existing environment.
  • B . A process for selecting protocols, address schemes, naming conventions, and so forth.
  • C . A process for understanding the customer’s business and technical goals.
  • D . The steps for designing a network topology.

Reveal Solution Hide Solution

Correct Answer: D
Question #7

Which statement is true in regards to VRRP?

  • A . The VRRP members use a control link between the two nodes.
  • B . The VRRP members use an FXP0 link between the two nodes.
  • C . The VRRP members must contain two identical routing platforms.
  • D . The VRRP members can contain two different routing platforms.

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.)

  • A . It should contain the logical and physical topology design requirements.
  • B . It is likely to be read by all decision makers.
  • C . It should contain the bill of materials.
  • D . It should address the customer’s goals, scope, and requirements.

Reveal Solution Hide Solution

Correct Answer: AC
Question #9

Which automation tool uses the master/minion model for changes?

  • A . Puppet
  • B . Chef
  • C . SaltStack
  • D . Ansible

Reveal Solution Hide Solution

Correct Answer: C
Question #10

What are two aspects of brownfield projects? (Choose two.)

  • A . New networks with few or no restraints to consider.
  • B . Old equipment that should be replaced.
  • C . Legacy applications that are no longer used.
  • D . Next-generation networks created from the ground up.

Reveal Solution Hide Solution

Correct Answer: BC

Question #11

What are three components of an RFP? (Choose three.)

  • A . general information about the existing network environment
  • B . a list of devices to meet the design requirements
  • C . a list of design requirements
  • D . a list of available IP addresses within their current IP allocation
  • E . the types of solutions that the design must include

Reveal Solution Hide Solution

Correct Answer: ACE
Question #12

Which name is used by a service provider to identify the edge device inside the central office facing the customer?

  • A . LSR
  • B . PE
  • C . CE
  • D . P

Reveal Solution Hide Solution

Correct Answer: B
Question #13

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows.

The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.

In this scenario, which type of security design would fulfill this requirement?

  • A . a centralized security appliance
  • B . a container-based security deployment
  • C . a physical security device connected to each host
  • D . an all-in-one virtual security device in each host

Reveal Solution Hide Solution

Correct Answer: B
Question #14

Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for which protocol?

  • A . SNMP
  • B . IPv6
  • C . OSPF
  • D . STP

Reveal Solution Hide Solution

Correct Answer: D
Question #15

In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)

  • A . WAN edge
  • B . aggregation
  • C . core
  • D . access

Reveal Solution Hide Solution

Correct Answer: AD
Question #16

What is the forth step of the Juniper recommended executive summary structure of an RFP?

  • A . Identification of business benefits.
  • B . Relevant supporting information outlining why the customer should choose your plan.
  • C . Overview of your proposed solution.
  • D . Introduction of the customer’s need or problem.

Reveal Solution Hide Solution

Correct Answer: B
Question #17

What are the three phases of the Juniper lifecycle service approach? (Choose three.)

  • A . Operate
  • B . Migrate
  • C . Plan
  • D . Build

Reveal Solution Hide Solution

Correct Answer: ACD
Question #18

Which solution ensures data security in this environment?

  • A . Use PNAC on all inter-switch connections.
  • B . Use LLDP on all inter-switch connections.
  • C . Use LACP on all inter-switch connections.
  • D . Use MACsec on all inter-switch connections.

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which two statements are true when determining the size and scope of a new network design? (Choose two.)

  • A . The number of users is important.
  • B . The number of users is not important.
  • C . The type of devices is important.
  • D . The type of devices is not important.

Reveal Solution Hide Solution

Correct Answer: AC
Question #20

On an SRX Series device, what are three match criteria of a security policy? (Choose three.)

  • A . MAC address
  • B . IP address
  • C . QoS
  • D . security zone
  • E . application port

Reveal Solution Hide Solution

Correct Answer: BDE

Question #21

Which two statements properly describe Junos operational scripts? (Choose two.)

  • A . A Junos operational script can only be only be called from another script.
  • B . A Junos operational script can be executed manually.
  • C . A Junos operational script can be executed automatically when a user logs in.
  • D . A Junos operational script can only execute one operational command per script.

Reveal Solution Hide Solution

Correct Answer: BC
Question #22

Which sub-phase of the plan methodology must you do first?

  • A . Access
  • B . Scope
  • C . Design
  • D . Build

Reveal Solution Hide Solution

Correct Answer: A
Question #23

You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers.

In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)

  • A . The total number of devices is increased.
  • B . The overall network performance is increased.
  • C . The number of connections between devices is decreased.
  • D . The number of protocols used is decreased.

Reveal Solution Hide Solution

Correct Answer: BC
Question #24

What is the cost-effective cable solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters)?

  • A . multimode fiber
  • B . single-mode fiber
  • C . power cable
  • D . UTP

Reveal Solution Hide Solution

Correct Answer: A
Question #25

Your corporate network is located in a single, multifloor building. Several smaller, remote buildings connect into your main corporate network.

Which topology describes your network?

  • A . data center
  • B . full mesh
  • C . campus
  • D . hub-and-spoke

Reveal Solution Hide Solution

Correct Answer: D
Question #26

What are two benefits of VRRP? (Choose two.)

  • A . proprietary protocol
  • B . open standards protocol
  • C . provides redundancy through a virtual IP address
  • D . provides redundancy through dual routing engines

Reveal Solution Hide Solution

Correct Answer: BC
Question #27

Which two statements properly describe Junos event policies? (Choose two.)

  • A . An event policy uses if-then-else logic.
  • B . An event policy uses for-loop logic.
  • C . You can execute Junos OS operational command for the action of an event policy.
  • D . You cannot execute Junos OS operational command for the action of an event policy.

Reveal Solution Hide Solution

Correct Answer: AC
Question #28

Which two statements are true regarding greenfield projects? (Choose two.)

  • A . The amount of floor space and cooling are not defined as part of a greenfield project.
  • B . In greenfield projects, the existing floor space and cooling may need to be considered.
  • C . Greenfield projects are typically new networks with few or no restraints to consider.
  • D . Greenfield projects typically consist of existing network components with extensive integration required.

Reveal Solution Hide Solution

Correct Answer: AC
Question #29

Which type of platform would be used to correlate data and logs from many different network and security appliances?

  • A . Juniper Secure Analytics
  • B . MX Series routers
  • C . Pulse Secure
  • D . QFabric

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution.

Which two statements describe how you would meet the business managers’ objectives? (Choose two.)

  • A . Ensure that the solution is easy to manage for the IT staff.
  • B . Ensure that the solution is cost effective.
  • C . Ensure that the solution is easy to use for the end user.
  • D . Ensure that the solution provides a high quality experience for the user.

Reveal Solution Hide Solution

Correct Answer: CD

Question #31

Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)

  • A . You need to include network redundancy in your design.
  • B . You need to include redundant wireless access points in your design.
  • C . Hardware redundancy is not necessary for the wireless clients in your design.
  • D . Redundant WAN connections are unnecessary in your design.

Reveal Solution Hide Solution

Correct Answer: AB
Question #32

Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors.

Which two factors are important from an application-driven network impact perspective? (Choose two.)

  • A . presence of elephant flows
  • B . IGP protocols in use
  • C . use of HTTPS protocols by the application
  • D . short timers

Reveal Solution Hide Solution

Correct Answer: AD
Question #33

You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn’t require STP.

Which technology can you recommend to the customer?

  • A . Virtual Chassis
  • B . VSTP
  • C . VLANs
  • D . IPsec

Reveal Solution Hide Solution

Correct Answer: A
Question #34

What is the first step of the Juniper recommended executive summary structure of an RFP?

  • A . Identification of business benefits.
  • B . Relevant supporting information outlining why the customer should choose your plan.
  • C . Overview of your proposed solution.
  • D . Introduction of the customer’s need or problem.

Reveal Solution Hide Solution

Correct Answer: D
Question #35

You are designing a solution to allow secure communication over the public Internet for a corporate WAN deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate headquarters.

Which solution will work in this scenario?

  • A . fill mesh IPsec VPN
  • B . hub-and-spoke GRE VPN
  • C . Layer 3 VPN
  • D . hub-and-spoke IPsec VPN

Reveal Solution Hide Solution

Correct Answer: D
Question #36

Which three characteristics are associated with the Physical Layer of the OSI reference model? (Choose three.)

  • A . cables
  • B . routing protocols
  • C . electricity
  • D . full duplex communications
  • E . TCP/IP

Reveal Solution Hide Solution

Correct Answer: ACD
Question #37

Click the Exhibit button.

Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.

What should you do to accomplish this task?

  • A . Use VRRP on Agg-1 and Agg-2.
  • B . Place Agg-1 and Agg-2 in a Virtual Chassis.
  • C . Use RSTP on all devices.
  • D . Use BGP load balancing on all devices.

Reveal Solution Hide Solution

Correct Answer: B
Question #38

Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?

  • A . stub
  • B . totally stubby
  • C . backbone
  • D . NSSA

Reveal Solution Hide Solution

Correct Answer: D
Question #39

You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network.

Which Juniper Networks product will accomplish this task?

  • A . UTM
  • B . Sky ATP
  • C . JATP
  • D . SDSN

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Which two statements are true about a service-centric data center model? (Choose two.)

  • A . A service-centric data center model pools compute resources.
  • B . A service-centric data center model pools storage resources.
  • C . A service-centric data center model does not pool storage resources.
  • D . A service-centric data center model does not pool compute resources.

Reveal Solution Hide Solution

Correct Answer: AB

Question #41

Which statement describes a data center is right?

  • A . The data center locally hosts thousands of users with wired connections, all with three to four active devices.
  • B . The data center typically involves high density topologies with multiple points of access.
  • C . The data center encompasses a broad area that is used to interconnect business locations and resources.
  • D . The data center houses the computing resources and services used by a company.

Reveal Solution Hide Solution

Correct Answer: D
Question #42

What are the first two steps of business continuity planning? (Choose two.)

  • A . know your network
  • B . test the plan
  • C . formulate the plan
  • D . assess the risks

Reveal Solution Hide Solution

Correct Answer: AD
Question #43

What are two main elements of a network design RFP? (Choose two.)

  • A . business requirements
  • B . staffing requirements
  • C . e-waste requirements
  • D . environmental requirements

Reveal Solution Hide Solution

Correct Answer: AD
Question #44

You are designing a network design in which access between different groups must be tightly restricted.

What should you do to accomplish this task?

  • A . A Layer 7 IDP
  • B . A Layer 3 switch
  • C . A Layer 4 firewall
  • D . A Layer 2 switch

Reveal Solution Hide Solution

Correct Answer: C
Question #45

Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario.

What would you recommend?

  • A . Deploying a Data Center Interconnect.
  • B . Deploying centralized management.
  • C . Deploying decentralized management.
  • D . Deploying dual uplinks to separate ISPs.

Reveal Solution Hide Solution

Correct Answer: A
Question #46

What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.)

  • A . OoB allows the use of Telnet as a management protocol.
  • B . OoB provides increased network security.
  • C . OoB is more cost-effective when purchasing equipment.
  • D . OoB provides more reliable management access.
  • E . OoB frees up network bandwidth on campus switches.

Reveal Solution Hide Solution

Correct Answer: BDE
Question #47

Which two statements are correct in regards to creating a successful network design for a customer? (Choose two.)

  • A . You should understand the state of the customer’s current network.
  • B . You should analyze current and future network behavior.
  • C . You should only consider greenfield network designs.
  • D . You should only consider brownfield network designs.

Reveal Solution Hide Solution

Correct Answer: AB
Question #48

You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites.

Which two solutions would meet these requirements? (Choose two.)

  • A . IPsec tunnels over the Internet
  • B . GRE tunnels over the Internet
  • C . MPLS Layer 3 VPN
  • D . VPLS Layer 2 VPN

Reveal Solution Hide Solution

Correct Answer: AD
Question #49

What is the maximum number of chassis supported in an SRX Series chassis cluster?

  • A . ten
  • B . twenty
  • C . four
  • D . two

Reveal Solution Hide Solution

Correct Answer: D
Question #50

What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN deployment?

  • A . Internet gateway
  • B . MACsec
  • C . power redundancy
  • D . DHCP

Reveal Solution Hide Solution

Correct Answer: A

Question #51

Exhibit:

Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.)

  • A . You should use VRRP on the SRX devices to WAN connections.
  • B . You should use VRRP on the SRX devices for users in Group-A.
  • C . You should use VRRP on the SRX devices for users in Group-B.
  • D . You should use VRRP on the SRX devices for users in Group-C.

Reveal Solution Hide Solution

Correct Answer: CD
Question #52

Which three questions should be asked when performing a business impact analysis? (Choose three.)

  • A . What is the cost of both partial and full outages?
  • B . What is the replacement cost of the core switches?
  • C . Which functions and services are critical to the company’s survival?
  • D . How many redundant data paths are there?
  • E . How long could an outage be sustained?

Reveal Solution Hide Solution

Correct Answer: ACE
Question #53

You want to stretch Layer 2 traffic between two data centers.

Which three open standards protocols would be used for this task? (Choose three.)

  • A . EVPN
  • B . OTV
  • C . VPLS
  • D . FabricPath
  • E . GRE

Reveal Solution Hide Solution

Correct Answer: ACE
Question #54

Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.)

  • A . video conferences
  • B . e-mail
  • C . voice over IP (VoIP)
  • D . customer relationship management (CRM)

Reveal Solution Hide Solution

Correct Answer: AC
Question #55

Which data-interchange format is used to automate JUNOS?

  • A . JSON
  • B . Fortran
  • C . C++
  • D . Java

Reveal Solution Hide Solution

Correct Answer: A
Question #56

Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern.

Which solution should you include in your design proposal?

  • A . SSL
  • B . NAC
  • C . QoS
  • D . BYOD

Reveal Solution Hide Solution

Correct Answer: B
Question #57

The connectivity and throughput requirements RFP element contains which two items? (Choose two.)

  • A . Hierarchical design considerations
  • B . Number of wireless connections needed
  • C . Traffic analysis
  • D . Functionality of each module within the design

Reveal Solution Hide Solution

Correct Answer: BC
Question #58

Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.

Which two technologies can you recommend for the design? (Choose two.)

  • A . DVMRP
  • B . PIM
  • C . IGMPv2
  • D . DTP

Reveal Solution Hide Solution

Correct Answer: BC
Question #59

What is a defining characteristic of a Layer 3 network?

  • A . A Layer 3 network segments broadcast traffic.
  • B . A Layer 3 network forwards all traffic to a default gateway.
  • C . A Layer 3 network forwards only multicast traffic.
  • D . A Layer 3 network segments traffic at the presentation layer.

Reveal Solution Hide Solution

Correct Answer: A
Question #60

Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)

  • A . You should list all the functions and services in the network.
  • B . You should perform a business impact analysis.
  • C . You should perform a risk assessment.
  • D . You should develop a plan of action to mitigate the risks.

Reveal Solution Hide Solution

Correct Answer: AB

Question #61

A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device.

Which three measurements do you need to satisfy the company’s requirement? (Choose three.)

  • A . the number of physical desktop ports
  • B . the number of power over Ethernet ports
  • C . the number of guest access users
  • D . the number of unmanned IP enabled end-point systems
    the number of WLAN access points

Reveal Solution Hide Solution

Correct Answer: ACD
Question #62

You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants to enforce security measures on east-west traffic between virtual machines.

Which solution should you recommend in this situation?

  • A . JATP
  • B . Sky ATP
  • C . Virtual Chassis
  • D . vSRX

Reveal Solution Hide Solution

Correct Answer: A
Question #63

Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.

Which two technologies can you recommend for the design? (Choose two.)

  • A . VPLS
  • B . VRRP
  • C . VTP
  • D . HSRP

Reveal Solution Hide Solution

Correct Answer: AB
Question #64

Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.)

  • A . VCF uses a spine-and-leaf architecture.
  • B . VCF uses a hub-and-spoke architecture.
  • C . Each connected host in a data center is no more than three hops away from every other host in a data center.
  • D . Each connected host in a data center is no more than two hops away from every other host in a data center.

Reveal Solution Hide Solution

Correct Answer: AD
Question #65

What are the last two steps of business continuity planning? (Choose two.)

  • A . know your network
  • B . test the plan
  • C . formulate the plan
  • D . assess the risks

Reveal Solution Hide Solution

Correct Answer: BC
Question #66

Which two statements are true regarding chassis clustering? (Choose two.)

  • A . The chassis cluster uses a control link between the two nodes.
  • B . The chassis cluster uses an FXP0 link between the two nodes.
  • C . The chassis cluster must contain two identical MX Series devices.
  • D . The chassis cluster must contain two identical SRX Series devices.

Reveal Solution Hide Solution

Correct Answer: AD
Question #67

You are working on a service provider network. You will provide network services to multiple companies across your network, while maintaining separation of traffic for different corporate entities.

What are two high-level design alternatives that will meet your requirement? (Choose two.)

  • A . IPsec VPN
  • B . VRRP
  • C . MSDP
  • D . MPLS

Reveal Solution Hide Solution

Correct Answer: AD
Question #68

The modular requirements RFP element contains which two items? (Choose two.)

  • A . Hierarchical design considerations
  • B . Number of wireless connections needed
  • C . Traffic analysis
  • D . Functionality of each module within the design

Reveal Solution Hide Solution

Correct Answer: AD
Question #69

What are two aspects of greenfield projects? (Choose two.)

  • A . New networks with few or no restraints to consider.
  • B . Old equipment that should be replaced.
  • C . Legacy applications that are no longer used.
  • D . Next-generation networks created from the ground up.

Reveal Solution Hide Solution

Correct Answer: AD
Question #70

Which two groups within the IT organization will likely need training if a new type of network equipment is deployed throughout the enterprise? (Choose two.)

  • A . application development
  • B . systems administrators
  • C . network engineering
  • D . network operations

Reveal Solution Hide Solution

Correct Answer: CD

Question #71

What are two requirements that every RFP response should include? (Choose two.)

  • A . a support plan that includes details about servicing the components once operational
  • B . a detailed competitor comparison document that indicates the proposed design is the least expensive option
  • C . a detailed forecast of exception handling after the design has been implemented and is operational
  • D . an implementation plan that includes a description of how the design will be implemented

Reveal Solution Hide Solution

Correct Answer: AD
Question #72

Which two items must be included in an RFP include? (Choose two.)

  • A . A list of design requirements.
  • B . The new design of the network.
  • C . An analysis of application behavior in the network.
  • D . The types of solutions the design must provide.

Reveal Solution Hide Solution

Correct Answer: AD
Question #73

You want to use standard cabling instead of crossover cabling in an environment without MDIX.

In which two situations would this apply? (Choose two.)

  • A . server-to-switch
  • B . computer-to-switch
  • C . computer-to-computer
  • D . switch-to-switch

Reveal Solution Hide Solution

Correct Answer: AB
Question #74

Which design boundary is caused by the customer’s existing physical environment?

  • A . Marketing users are not permitted access to the company’s financial servers.
  • B . Current infrastructure lacks the media to interconnect buildings with each other.
  • C . Key stakeholders disagree on how the funding for the project should be spent.
  • D . HTTP traffic is expected to increase on the network by 57% over the next two years.

Reveal Solution Hide Solution

Correct Answer: B
Question #75

Which two items are key RFP elements? (Choose two.)

  • A . Physical design requirements
  • B . Modular requirements
  • C . Logical design requirements
  • D . Connectivity and throughput requirements

Reveal Solution Hide Solution

Correct Answer: BD
Question #76

You need to deploy an IPsec VPN technology that provides low application latency when a remote office is communicating with another remote office. This solution must also provide low management overhead.

Which IPsec VPN technology should you choose for this design?

  • A . SSL VPN
  • B . full mesh VPN
  • C . hub-and-spoke VPN
  • D . ADVPN

Reveal Solution Hide Solution

Correct Answer: D
Question #77

You are developing a network monitoring strategy to track network response time and availability. The monitoring strategy should be scalable to accommodate future network growth.

Which two statements are true in this scenario? (Choose two.)

  • A . Network reachability monitoring functions should be centralized to a dedicated monitoring device.
  • B . RPM allows the monitoring of reachability, but does not allow delay or jitter monitoring.
  • C . Network reachability monitoring functions should be delegated to each network device.
  • D . RMON is a standardized system that is not vendor specific.

Reveal Solution Hide Solution

Correct Answer: AD
Question #78

You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely.

Which technology would you recommend?

  • A . ADVPN
  • B . hub-and-spoke VPN
  • C . full mesh VPN
  • D . SSL VPN

Reveal Solution Hide Solution

Correct Answer: D
Question #79

You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?

  • A . A network baseline identifies devices that do not have redundant components.
  • B . A network baseline identifies traffic growth patterns across network devices.
  • C . A network baseline identifies how many users are connected to the network.
  • D . A network baseline identifies the type and level of traffic load on the network.

Reveal Solution Hide Solution

Correct Answer: D
Question #80

You are asked to deploy VPNs in your network.

What are two deployment models you would use? (Choose two.)

  • A . site to site
  • B . hub and spoke
  • C . overlay
  • D . hierarchical

Reveal Solution Hide Solution

Correct Answer: AB

Question #81

Which two statements properly describe Junos event scripts? (Choose two.)

  • A . Junos event scripts are triggered manually.
  • B . Junos event scripts are triggered automatically.
  • C . Junos event scripts can be used to monitor the overall status of the device.
  • D . Junos event scripts cannot be used to monitor the overall status of the device.

Reveal Solution Hide Solution

Correct Answer: BC
Question #82

An RFP response should include which three items (Choose three.)

  • A . Executive summary
  • B . Bill of materials
  • C . A solution overview
  • D . technical specifications

Reveal Solution Hide Solution

Correct Answer: ACD
Question #83

A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute.

Which Junos automation tool would accomplish this task?

  • A . REST Explorer
  • B . JSNAPy
  • C . JET
  • D . event scripts

Reveal Solution Hide Solution

Correct Answer: C
Question #84

Your customer has indicated that they are about to acquire another organization and integrate that acquisition into their corporation.

Which two major areas must be examined as part of the network design? (Choose two.)

  • A . scale constraints of existing hardware
  • B . regulatory approval of the takeover
  • C . restructuring of staff responsibilities
  • D . protocol incompatibilities

Reveal Solution Hide Solution

Correct Answer: AD
Question #85

You are examining the customer’s IT organization and its responsibilities to determine how it will be impacted by your design. In this scenario, which three business functions are typically provided? (Choose three.)

  • A . network architecture and design
  • B . compute resourceprovisioning
  • C . manufacturing
  • D . network operations
  • E . product marketing

Reveal Solution Hide Solution

Correct Answer: ABD
Question #86

What are two reasons why you would send an RFP to multiple vendors (Choose two.)

  • A . to eliminate vendors who cannot meet the requirements
  • B . to warranty the process against fraud
  • C . to satisfy international law requiring a minimum of three vendors
  • D . to compare competing proposals

Reveal Solution Hide Solution

Correct Answer: AD
Question #87

You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables.

What is the maximum distance between the Ethernet switches?

  • A . 100 feet
  • B . 1000 feet
  • C . 100 meters
  • D . 1000 meters

Reveal Solution Hide Solution

Correct Answer: C
Question #88

You are designing a network management strategy for a new network.

The requirements for the management of network devices are shown below:

– Administrator passwords must have an expiration date.

– Administrators must be assigned role-specific privileges on each device.

In this scenario, which statement is true?

  • A . Local authentication must be used on each device.
  • B . A centralized AAA system must be used for authentication.
  • C . All devices must be configured with the same privilege levels.
  • D . Each user must have a unique login account.

Reveal Solution Hide Solution

Correct Answer: B
Question #89

Network Director is an example of which type of network management application?

  • A . on-box
  • B . out-of-band
  • C . centralized
  • D . op script

Reveal Solution Hide Solution

Correct Answer: C
Question #90

Why would you recommend Junos Space Security Director in a network design?

  • A . It simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks.
  • B . It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.
  • C . It helps administrators to more quickly and intuitively manage all phases of a security policy life cycle
  • D . It provides detection, isolation, and resolution of network faults and incidents.

Reveal Solution Hide Solution

Correct Answer: C

Question #91

Which statements is true in regards to the Assess the Risks step of business continuity planning?

  • A . You should list all the functions and services in the network.
  • B . You should perform a business impact analysis.
  • C . You should perform a risk assessment.
  • D . You should develop a plan of action to mitigate the risks.

Reveal Solution Hide Solution

Correct Answer: C
Question #92

A customer has determined the need to upgrade the network so that the packaging and shipping facilities can meet current demand. The customer has voiced concerns that the network design and implementation cannot affect current sales in any way.

What are two ways to address this concern in your network design? (Choose two.)

  • A . Create continuity plans.
  • B . Collect job aids.
  • C . Define security measures.
  • D . Analyze packet flow.

Reveal Solution Hide Solution

Correct Answer: AD
Question #93

As part of your automation design, you need an off-box system that will be able to monitor telemetry information. You must then use that information to dynamically update devices as needed to ensure optimal network traffic flow.

Which automation solution would accomplish this goal?

  • A . Ruby
  • B . SaltStack
  • C . Chef
  • D . Puppet

Reveal Solution Hide Solution

Correct Answer: D
Question #94

When implementing a top-down design methodology, where would you begin collecting information to start the design process?

  • A . the CEO of the corporation
  • B . the Application Layer of the OSI model
  • C . the currently-owned network equipment
  • D . the WAN edge

Reveal Solution Hide Solution

Correct Answer: B
Question #95

Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors’ networking equipment.

Which two technologies can you recommend for the design? (Choose two.)

  • A . ISIS
  • B . LACP
  • C . GLBP
  • D . PAgP

Reveal Solution Hide Solution

Correct Answer: AB
Question #96

You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.)

  • A . Virtual Chassis for EX devices.
  • B . High bandwidth uplink.
  • C . Redundant power supplies for network devices.
  • D . SFP interfaces.

Reveal Solution Hide Solution

Correct Answer: AC
Question #97

You must design a network for a large campus building with many users who are in different departments.

Which technology should you use for your design?

  • A . VLAN
  • B . GRE
  • C . BGP
  • D . RIP

Reveal Solution Hide Solution

Correct Answer: A
Question #98

You are working with a customer who specializes in selling custom toy boxes in more than 50 stores. The customer’s financial information must be kept secure.

Which security standard should you include in your design proposal?

  • A . user-based firewall
  • B . NAC
  • C . BYOD
  • D . PCI compliance

Reveal Solution Hide Solution

Correct Answer: D
Question #99

What are three components used to enforce 802.1X in your design? (Choose three.)

  • A . authenticator
  • B . VoIP phone
  • C . authentication server
  • D . supplicant
  • E . edge router

Reveal Solution Hide Solution

Correct Answer: ACD
Question #100

When discussing network reliability, what does the term “five nines” mean?

  • A . The network is up 99.999% of the time.
  • B . The network is up .99999% of the time.
  • C . The network is up 9.9999% of the time.
  • D . The network is up .09999% of the time.

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version