Design, Associate (JNCDA) Certification JN0-1102 Updated Dumps Questions

JN0-1102 is the written exam of the associate-level of Juniper Design track, which verify your understanding of network design fundamentals. Juniper JN0-1102 updated dumps questions are written by the experienced team, who collected all the valid questions and answers based on the Design, Associate (JNCDA) exam objectives. It must be clear that the Design, Associate (JNCDA) Certification JN0-1102 Updated Dumps Questions ensure your success.

Read Juniper JNCDA JN0-1102 Free Dumps Before Getting The Updated Questions

1. Which data-interchange format is used to automate JUNOS?

2. Which two statements describe business continuity? (Choose two.)

3. Which two statements describe why the executive summary section of an RFP so important? (Choose two.)

4. What are two advantages of using an out-of-band (OOB) management network?

5. Which two industry standard automation platforms are used to provision Juniper data center switches? (Choose two.)

6. What should be the third item in your network design checklist?

7. Which statement is true in regards to VRRP?

8. Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.)

9. Which automation tool uses the master/minion model for changes?

10. What are two aspects of brownfield projects? (Choose two.)

11. What are three components of an RFP? (Choose three.)

12. Which name is used by a service provider to identify the edge device inside the central office facing the customer?

13. You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows.

The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.

In this scenario, which type of security design would fulfill this requirement?

14. Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for which protocol?

15. In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)

16. What is the forth step of the Juniper recommended executive summary structure of an RFP?

17. What are the three phases of the Juniper lifecycle service approach? (Choose three.)

18. Which solution ensures data security in this environment?

19. Which two statements are true when determining the size and scope of a new network design? (Choose two.)

20. On an SRX Series device, what are three match criteria of a security policy? (Choose three.)

21. Which two statements properly describe Junos operational scripts? (Choose two.)

22. Which sub-phase of the plan methodology must you do first?

23. You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers.

In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)

24. What is the cost-effective cable solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters)?

25. Your corporate network is located in a single, multifloor building. Several smaller, remote buildings connect into your main corporate network.

Which topology describes your network?

26. What are two benefits of VRRP? (Choose two.)

27. Which two statements properly describe Junos event policies? (Choose two.)

28. Which two statements are true regarding greenfield projects? (Choose two.)

29. Which type of platform would be used to correlate data and logs from many different network and security appliances?

30. Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution.

Which two statements describe how you would meet the business managers’ objectives? (Choose two.)

31. Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)

32. Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors.

Which two factors are important from an application-driven network impact perspective? (Choose two.)

33. You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn't require STP.

Which technology can you recommend to the customer?

34. What is the first step of the Juniper recommended executive summary structure of an RFP?

35. You are designing a solution to allow secure communication over the public Internet for a corporate WAN deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate headquarters.

Which solution will work in this scenario?

36. Which three characteristics are associated with the Physical Layer of the OSI reference model? (Choose three.)

37. Click the Exhibit button.

Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.

What should you do to accomplish this task?

38. Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?

39. You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network.

Which Juniper Networks product will accomplish this task?

40. Which two statements are true about a service-centric data center model? (Choose two.)

41. Which statement describes a data center is right?

42. What are the first two steps of business continuity planning? (Choose two.)

43. What are two main elements of a network design RFP? (Choose two.)

44. You are designing a network design in which access between different groups must be tightly restricted.

What should you do to accomplish this task?

45. Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario.

What would you recommend?

46. What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.)

47. Which two statements are correct in regards to creating a successful network design for a customer? (Choose two.)

48. You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites.

Which two solutions would meet these requirements? (Choose two.)

49. What is the maximum number of chassis supported in an SRX Series chassis cluster?

50. What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN deployment?

51. Exhibit:

Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.)

52. Which three questions should be asked when performing a business impact analysis? (Choose three.)

53. You want to stretch Layer 2 traffic between two data centers.

Which three open standards protocols would be used for this task? (Choose three.)

54. Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.)

55. Which data-interchange format is used to automate JUNOS?

56. Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern.

Which solution should you include in your design proposal?

57. The connectivity and throughput requirements RFP element contains which two items? (Choose two.)

58. Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment.

Which two technologies can you recommend for the design? (Choose two.)

59. What is a defining characteristic of a Layer 3 network?

60. Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)

61. A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device.

Which three measurements do you need to satisfy the company's requirement? (Choose three.)

62. You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants to enforce security measures on east-west traffic between virtual machines.

Which solution should you recommend in this situation?

63. Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment.

Which two technologies can you recommend for the design? (Choose two.)

64. Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.)

65. What are the last two steps of business continuity planning? (Choose two.)

66. Which two statements are true regarding chassis clustering? (Choose two.)

67. You are working on a service provider network. You will provide network services to multiple companies across your network, while maintaining separation of traffic for different corporate entities.

What are two high-level design alternatives that will meet your requirement? (Choose two.)

68. The modular requirements RFP element contains which two items? (Choose two.)

69. What are two aspects of greenfield projects? (Choose two.)

70. Which two groups within the IT organization will likely need training if a new type of network equipment is deployed throughout the enterprise? (Choose two.)

71. What are two requirements that every RFP response should include? (Choose two.)

72. Which two items must be included in an RFP include? (Choose two.)

73. You want to use standard cabling instead of crossover cabling in an environment without MDIX.

In which two situations would this apply? (Choose two.)

74. Which design boundary is caused by the customer's existing physical environment?

75. Which two items are key RFP elements? (Choose two.)

76. You need to deploy an IPsec VPN technology that provides low application latency when a remote office is communicating with another remote office. This solution must also provide low management overhead.

Which IPsec VPN technology should you choose for this design?

77. You are developing a network monitoring strategy to track network response time and availability. The monitoring strategy should be scalable to accommodate future network growth.

Which two statements are true in this scenario? (Choose two.)

78. You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely.

Which technology would you recommend?

79. You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?

80. You are asked to deploy VPNs in your network.

What are two deployment models you would use? (Choose two.)

81. Which two statements properly describe Junos event scripts? (Choose two.)

82. An RFP response should include which three items (Choose three.)

83. A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute.

Which Junos automation tool would accomplish this task?

84. Your customer has indicated that they are about to acquire another organization and integrate that acquisition into their corporation.

Which two major areas must be examined as part of the network design? (Choose two.)

85. You are examining the customer’s IT organization and its responsibilities to determine how it will be impacted by your design. In this scenario, which three business functions are typically provided? (Choose three.)

86. What are two reasons why you would send an RFP to multiple vendors (Choose two.)

87. You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables.

What is the maximum distance between the Ethernet switches?

88. You are designing a network management strategy for a new network.

The requirements for the management of network devices are shown below:

- Administrator passwords must have an expiration date.

- Administrators must be assigned role-specific privileges on each device.

In this scenario, which statement is true?

89. Network Director is an example of which type of network management application?

90. Why would you recommend Junos Space Security Director in a network design?


 

Security Design, Specialist (JNCDS-SEC) JN0-1332 Real Dumps Questions
Automation and DevOps, Specialist (JNCIS-DevOps) JN0-421 Exam Dumps

Add a Comment

Your email address will not be published. Required fields are marked *