Juniper Networks Certified Design Associate (JNCDA) v1.0 (JN0-1101)

Page:    1 / 5   
Total 65 questions

What are two main data center profile solution templates? (Choose two.)

  • A. adaptive
  • B. transitional
  • C. high-performance computing
  • D. enterprise IT

Answer : CD

What are two characteristics of using the Virtual Chassis technology in the aggregation tier of a data center? (Choose two.)

  • A. You can fully use all up-links from the access tier.
  • B. It increases the control plane complexity.
  • C. If reduces the control plane complexity.
  • D. You cannot fully use all up-links from the access tier.

Answer : AC

What are two tiers used in a traditional data center design? (Choose two.)

  • A. core
  • B. aggregation
  • C. compute
  • D. user

Answer : AB

What are two guidelines when designing campus networks? (Choose two.)

  • A. The design must account for high control plane resources.
  • B. The design must allow for network resource availability.
  • C. The design must protect customer resources.
  • D. The design must allow for high bandwidth.

Answer : BC

Your campus network is rolling out a BYOD policy. Your design must ensure that guest users are restricted from accessing internal network resources.
Which two actions would solve this problem? (Choose two.)

  • A. Guest users should be placed in an isolated guest routing instance.
  • B. Guest users should be placed in an isolated guest VLAN.
  • C. Guest users should be placed in a non-isolated guest routing instance.
  • D. Guest users should be placed in a non-isolated guest VLAN.

Answer : AB

You are designing a network management strategy for a new network. The requirements for the management of network devices are shown below: "" Administrator passwords must have an expiration date. "" Administrators must be assigned role-specific privileges on each device.
In this scenario, which statement is true?

  • A. Local authentication must be used on each device.
  • B. A centralized AAA system must be used for authentication.
  • C. All devices must be configured with the same privilege levels.
  • D. Each user must have a unique login account.

Answer : B

In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)

  • A. access
  • B. WAN edge
  • C. core
  • D. aggregation

Answer : BD

You are designing a solution to allow secure communication over the public Internet for a corporate WAN deployment. For business policy reasons, all branch-to- branch traffic must first pass through the corporate headquarters.
Which solution will work in this scenario?

  • A. fill mesh IPsec VPN
  • B. hub-and-spoke GRE VPN
  • C. Layer 3 VPN
  • D. hub-and-spoke IPsec VPN

Answer : D

You are asked to provide a design proposal for a data center environment. As part of your solution, you are asked to simplify the management of the ToR EX
Series switches.
In this scenario, which solution will accomplish this requirement?

  • A. Clos fabric
  • B. MC-LAG
  • C. Virtual Chassis
  • D. VRRP

Answer : C

Which three steps are part of business continuity planning? (Choose three.)

  • A. Assess the risks.
  • B. Know your staff.
  • C. Know your network.
  • D. Understand your tools.
  • E. Test the plan.

Answer : ABC

What are two main elements of a network design RFP? (Choose two.)

  • A. business requirements
  • B. staffing requirements
  • C. e-waste requirements
  • D. environmental requirements

Answer : AD

What are two valid reasons to implement a network management solution within your network infrastructure? (Choose two.)

  • A. to increase network visibility
  • B. to eliminate the need for network planning
  • C. to reduce network operating expenditures
  • D. to reduce network capital expenditures

Answer : AC

What does the network MTTR measure?

  • A. the length of time it takes to design the network
  • B. the length of time to build the network
  • C. the length of time to repair the network
  • D. the length of time it takes to reboot the network devices

Answer : C

You are asked to propose a security solution that integrates with OpenStack, Kubernetes, and OpenShift.
Which Juniper Networks product will work in this scenario?

  • A. Sky ATP
  • B. SDSN
  • C. Contrail Security
  • D. JSA

Answer : C

What are three components used to enforce 802.1X in your design? (Choose three.)

  • A. authenticator
  • B. VoIP phone
  • C. authentication server
  • D. supplicant
  • E. edge router

Answer : ACD

Page:    1 / 5   
Total 65 questions