Uploaded by maycongym

JN0-1103

advertisement
Exam4
Training
QUESTION & ANSWER
Latest and valid Q&A
Once Fail, Full Refund
http://www.exam4training.com
The safer , easier way to help you pass any IT exams.
Exam
:
JN0-1103
Title
:
Design, Associate (JNCIADesign)
Version :
V8.02
1 / 53
The safer , easier way to help you pass any IT exams.
1.Which data-interchange format is used to automate JUNOS?
A. YAML
B. JavaScript
C. Visual Basic
D. Pascal
Answer: A
2.Which two statements describe business continuity? (Choose two.)
A. The prevention of interruption to mission-critical services.
B. The ability to reestablish full functionality quickly after a disaster.
C. Manually turning on a backup server after a disaster.
D. Manually loading previously backed up data.
Answer: AB
3.Which two statements describe why the executive summary section of an RFP so important? (Choose
two.)
A. It is likely to be read by all decision makers.
B. It is an overview of Juniper's value proposition to the customer.
C. It outlines the technical benefits of the proposed design.
D. It addresses the customer's goals, scope, and requirements.
Answer: AB
4.What are two advantages of using an out-of-band (OOB) management network?
A. An OOB management network is more reliable than in-band management network.
B. An OOB management network is less reliable than in-band management network.
C. An OOB management network requires higher bandwidth requirements than in-band management
network.
D. An OOB management network can function with lower bandwidth requirements than in-band
management network.
Answer: AD
5.Which two industry standard automation platforms are used to provision Juniper data center switches?
(Choose two.)
A. Python
B. Chef
C. OpenView
D. Tivoli
Answer: AB
6.What should be the third item in your network design checklist?
A. A validation process for analyzing customer's existing environment.
B. A process for selecting protocols, address schemes, naming conventions, and so forth.
C. A process for understanding the customer's business and technical goals.
D. The steps for designing a network topology.
2 / 53
The safer , easier way to help you pass any IT exams.
Answer: D
7.Which statement is true in regards to VRRP?
A. The VRRP members use a control link between the two nodes.
B. The VRRP members use an FXP0 link between the two nodes.
C. The VRRP members must contain two identical routing platforms.
D. The VRRP members can contain two different routing platforms.
Answer: D
8.Which two statements are true in regards to the technical specifications section of an RFP? (Choose
two.)
A. It should contain the logical and physical topology design requirements.
B. It is likely to be read by all decision makers.
C. It should contain the bill of materials.
D. It should address the customer's goals, scope, and requirements.
Answer: AC
9.Which automation tool uses the master/minion model for changes?
A. Puppet
B. Chef
C. SaltStack
D. Ansible
Answer: C
10.What are two aspects of brownfield projects? (Choose two.)
A. New networks with few or no restraints to consider.
B. Old equipment that should be replaced.
C. Legacy applications that are no longer used.
D. Next-generation networks created from the ground up.
Answer: BC
11.What are three components of an RFP? (Choose three.)
A. general information about the existing network environment
B. a list of devices to meet the design requirements
C. a list of design requirements
D. a list of available IP addresses within their current IP allocation
E. the types of solutions that the design must include
Answer: ACE
12.Which name is used by a service provider to identify the edge device inside the central office facing
the customer?
A. LSR
B. PE
C. CE
3 / 53
The safer , easier way to help you pass any IT exams.
D. P
Answer: B
13.You are designing a data center network that will require the rapid deployment and removal of
security features between virtual machines based on triggered traffic flows.
The data center will require the ability to scale up and down rapidly according to traffic load, and then
release resources when security services are not needed.
In this scenario, which type of security design would fulfill this requirement?
A. a centralized security appliance
B. a container-based security deployment
C. a physical security device connected to each host
D. an all-in-one virtual security device in each host
Answer: B
14.Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for
which protocol?
A. SNMP
B. IPv6
C. OSPF
D. STP
Answer: D
15.In a network design using the traditional tiered structure, which two tiers connect to untrusted
domains? (Choose two.)
A. WAN edge
B. aggregation
C. core
D. access
Answer: AD
16.What is the forth step of the Juniper recommended executive summary structure of an RFP?
A. Identification of business benefits.
B. Relevant supporting information outlining why the customer should choose your plan.
C. Overview of your proposed solution.
D. Introduction of the customer's need or problem.
Answer: B
17.What are the three phases of the Juniper lifecycle service approach? (Choose three.)
A. Operate
B. Migrate
C. Plan
D. Build
Answer: ACD
4 / 53
The safer , easier way to help you pass any IT exams.
18.Which solution ensures data security in this environment?
A. Use PNAC on all inter-switch connections.
B. Use LLDP on all inter-switch connections.
C. Use LACP on all inter-switch connections.
D. Use MACsec on all inter-switch connections.
Answer: A
19.Which two statements are true when determining the size and scope of a new network design?
(Choose two.)
A. The number of users is important.
B. The number of users is not important.
C. The type of devices is important.
D. The type of devices is not important.
Answer: AC
20.On an SRX Series device, what are three match criteria of a security policy? (Choose three.)
A. MAC address
B. IP address
C. QoS
D. security zone
E. application port
Answer: BDE
21.Which two statements properly describe Junos operational scripts? (Choose two.)
A. A Junos operational script can only be only be called from another script.
B. A Junos operational script can be executed manually.
C. A Junos operational script can be executed automatically when a user logs in.
D. A Junos operational script can only execute one operational command per script.
Answer: BC
22.Which sub-phase of the plan methodology must you do first?
A. Access
B. Scope
C. Design
D. Build
Answer: A
23.You are asked to provide a design proposal for an enterprise customer that currently has a three-tier
switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two
distinct layers.
In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)
A. The total number of devices is increased.
B. The overall network performance is increased.
C. The number of connections between devices is decreased.
5 / 53
The safer , easier way to help you pass any IT exams.
D. The number of protocols used is decreased.
Answer: BC
24.What is the cost-effective cable solution to connect a building access switch to a building distribution
switch at a distance of 400 feet (120 meters)?
A. multimode fiber
B. single-mode fiber
C. power cable
D. UTP
Answer: A
25.Your corporate network is located in a single, multifloor building. Several smaller, remote buildings
connect into your main corporate network.
Which topology describes your network?
A. data center
B. full mesh
C. campus
D. hub-and-spoke
Answer: D
26.What are two benefits of VRRP? (Choose two.)
A. proprietary protocol
B. open standards protocol
C. provides redundancy through a virtual IP address
D. provides redundancy through dual routing engines
Answer: BC
27.Which two statements properly describe Junos event policies? (Choose two.)
A. An event policy uses if-then-else logic.
B. An event policy uses for-loop logic.
C. You can execute Junos OS operational command for the action of an event policy.
D. You cannot execute Junos OS operational command for the action of an event policy.
Answer: AC
28.Which two statements are true regarding greenfield projects? (Choose two.)
A. The amount of floor space and cooling are not defined as part of a greenfield project.
B. In greenfield projects, the existing floor space and cooling may need to be considered.
C. Greenfield projects are typically new networks with few or no restraints to consider.
D. Greenfield projects typically consist of existing network components with extensive integration
required.
Answer: AC
29.Which type of platform would be used to correlate data and logs from many different network and
security appliances?
6 / 53
The safer , easier way to help you pass any IT exams.
A. Juniper Secure Analytics
B. MX Series routers
C. Pulse Secure
D. QFabric
Answer: A
30.Your customer is deploying a new unified communications (UC) solution and business managers
want to ensure that network users adopt and use the new solution.
Which two statements describe how you would meet the business managers’ objectives? (Choose two.)
A. Ensure that the solution is easy to manage for the IT staff.
B. Ensure that the solution is cost effective.
C. Ensure that the solution is easy to use for the end user.
D. Ensure that the solution provides a high quality experience for the user.
Answer: CD
31.Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)
A. You need to include network redundancy in your design.
B. You need to include redundant wireless access points in your design.
C. Hardware redundancy is not necessary for the wireless clients in your design.
D. Redundant WAN connections are unnecessary in your design.
Answer: AB
32.Your customer is experiencing problems with session drops and high response time. You are asked to
provide redesign suggestions to minimize these problems. You examine the applications that are
supported by your customer’s network to try to identify problem factors.
Which two factors are important from an application-driven network impact perspective? (Choose two.)
A. presence of elephant flows
B. IGP protocols in use
C. use of HTTPS protocols by the application
D. short timers
Answer: AD
33.You customer has had troubles in the past with his STP implementations and has asked you to
design a Layer 2 network that doesn't require STP.
Which technology can you recommend to the customer?
A. Virtual Chassis
B. VSTP
C. VLANs
D. IPsec
Answer: A
34.What is the first step of the Juniper recommended executive summary structure of an RFP?
A. Identification of business benefits.
B. Relevant supporting information outlining why the customer should choose your plan.
7 / 53
The safer , easier way to help you pass any IT exams.
C. Overview of your proposed solution.
D. Introduction of the customer's need or problem.
Answer: D
35.You are designing a solution to allow secure communication over the public Internet for a corporate
WAN deployment. For business policy reasons, all branch-to-branch traffic must first pass through the
corporate headquarters.
Which solution will work in this scenario?
A. fill mesh IPsec VPN
B. hub-and-spoke GRE VPN
C. Layer 3 VPN
D. hub-and-spoke IPsec VPN
Answer: D
36.Which three characteristics are associated with the Physical Layer of the OSI reference model?
(Choose three.)
A. cables
B. routing protocols
C. electricity
D. full duplex communications
E. TCP/IP
Answer: ACD
37.Click the Exhibit button.
Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the
links between the access tier and the aggregation tier are used.
What should you do to accomplish this task?
A. Use VRRP on Agg-1 and Agg-2.
B. Place Agg-1 and Agg-2 in a Virtual Chassis.
C. Use RSTP on all devices.
D. Use BGP load balancing on all devices.
8 / 53
The safer , easier way to help you pass any IT exams.
Answer: B
38.Which type of area should you use in an enterprise OSPF deployment if you want to prevent
propagation of type 5 LSAs but still allow the redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
Answer: D
39.You are required to stop zero-day threats while designing a secure network. Files are not allowed to
leave the local network.
Which Juniper Networks product will accomplish this task?
A. UTM
B. Sky ATP
C. JATP
D. SDSN
Answer: B
40.Which two statements are true about a service-centric data center model? (Choose two.)
A. A service-centric data center model pools compute resources.
B. A service-centric data center model pools storage resources.
C. A service-centric data center model does not pool storage resources.
D. A service-centric data center model does not pool compute resources.
Answer: AB
41.Which statement describes a data center is right?
A. The data center locally hosts thousands of users with wired connections, all with three to four active
devices.
B. The data center typically involves high density topologies with multiple points of access.
C. The data center encompasses a broad area that is used to interconnect business locations and
resources.
D. The data center houses the computing resources and services used by a company.
Answer: D
42.What are the first two steps of business continuity planning? (Choose two.)
A. know your network
B. test the plan
C. formulate the plan
D. assess the risks
Answer: AD
43.What are two main elements of a network design RFP? (Choose two.)
A. business requirements
9 / 53
The safer , easier way to help you pass any IT exams.
B. staffing requirements
C. e-waste requirements
D. environmental requirements
Answer: AD
44.You are designing a network design in which access between different groups must be tightly
restricted.
What should you do to accomplish this task?
A. A Layer 7 IDP
B. A Layer 3 switch
C. A Layer 4 firewall
D. A Layer 2 switch
Answer: C
45.Your customer wants to ensure that their data center is completely prepared for a disaster recovery
scenario.
What would you recommend?
A. Deploying a Data Center Interconnect.
B. Deploying centralized management.
C. Deploying decentralized management.
D. Deploying dual uplinks to separate ISPs.
Answer: A
46.What are three advantages of out-of-band (OoB) management over in-band management? (Choose
three.)
A. OoB allows the use of Telnet as a management protocol.
B. OoB provides increased network security.
C. OoB is more cost-effective when purchasing equipment.
D. OoB provides more reliable management access.
E. OoB frees up network bandwidth on campus switches.
Answer: BDE
47.Which two statements are correct in regards to creating a successful network design for a customer?
(Choose two.)
A. You should understand the state of the customer's current network.
B. You should analyze current and future network behavior.
C. You should only consider greenfield network designs.
D. You should only consider brownfield network designs.
Answer: AB
48.You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the
ability to have direct adjacencies between your remote sites.
Which two solutions would meet these requirements? (Choose two.)
A. IPsec tunnels over the Internet
10 / 53
The safer , easier way to help you pass any IT exams.
B. GRE tunnels over the Internet
C. MPLS Layer 3 VPN
D. VPLS Layer 2 VPN
Answer: AD
49.What is the maximum number of chassis supported in an SRX Series chassis cluster?
A. ten
B. twenty
C. four
D. two
Answer: D
50.What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN
deployment?
A. Internet gateway
B. MACsec
C. power redundancy
D. DHCP
Answer: A
51.Exhibit:
Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.)
A. You should use VRRP on the SRX devices to WAN connections.
B. You should use VRRP on the SRX devices for users in Group-A.
C. You should use VRRP on the SRX devices for users in Group-B.
D. You should use VRRP on the SRX devices for users in Group-C.
Answer: CD
11 / 53
The safer , easier way to help you pass any IT exams.
52.Which three questions should be asked when performing a business impact analysis? (Choose
three.)
A. What is the cost of both partial and full outages?
B. What is the replacement cost of the core switches?
C. Which functions and services are critical to the company’s survival?
D. How many redundant data paths are there?
E. How long could an outage be sustained?
Answer: ACE
53.You want to stretch Layer 2 traffic between two data centers.
Which three open standards protocols would be used for this task? (Choose three.)
A. EVPN
B. OTV
C. VPLS
D. FabricPath
E. GRE
Answer: ACE
54.Which two applications suggest that the network should be engineered to support QoS/CoS
functionality? (Choose two.)
A. video conferences
B. e-mail
C. voice over IP (VoIP)
D. customer relationship management (CRM)
Answer: AC
55.Which data-interchange format is used to automate JUNOS?
A. JSON
B. Fortran
C. C++
D. Java
Answer: A
56.Your customer frequently hosts visitors who are not employees of the organization. The visitors
typically request Internet access but do not require access to corporate resources. Network security is
the customer’s primary concern.
Which solution should you include in your design proposal?
A. SSL
B. NAC
C. QoS
D. BYOD
Answer: B
12 / 53
The safer , easier way to help you pass any IT exams.
57.The connectivity and throughput requirements RFP element contains which two items? (Choose two.)
A. Hierarchical design considerations
B. Number of wireless connections needed
C. Traffic analysis
D. Functionality of each module within the design
Answer: BC
58.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. DVMRP
B. PIM
C. IGMPv2
D. DTP
Answer: BC
59.What is a defining characteristic of a Layer 3 network?
A. A Layer 3 network segments broadcast traffic.
B. A Layer 3 network forwards all traffic to a default gateway.
C. A Layer 3 network forwards only multicast traffic.
D. A Layer 3 network segments traffic at the presentation layer.
Answer: A
60.Which two statements are true in regards to the Know Your Network step of business continuity
planning? (Choose two.)
A. You should list all the functions and services in the network.
B. You should perform a business impact analysis.
C. You should perform a risk assessment.
D. You should develop a plan of action to mitigate the risks.
Answer: AB
61.A company asks you to develop a solution to provide secure access to the corporate network with a
goal of providing a differentiated security policy per role and per device.
Which three measurements do you need to satisfy the company's requirement? (Choose three.)
A. the number of physical desktop ports
B. the number of power over Ethernet ports
C. the number of guest access users
D. the number of unmanned IP enabled end-point systems
the number of WLAN access points
Answer: ACD
62.You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants
to enforce security measures on east-west traffic between virtual machines.
Which solution should you recommend in this situation?
13 / 53
The safer , easier way to help you pass any IT exams.
A. JATP
B. Sky ATP
C. Virtual Chassis
D. vSRX
Answer: A
63.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. VPLS
B. VRRP
C. VTP
D. HSRP
Answer: AB
64.Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.)
A. VCF uses a spine-and-leaf architecture.
B. VCF uses a hub-and-spoke architecture.
C. Each connected host in a data center is no more than three hops away from every other host in a
data center.
D. Each connected host in a data center is no more than two hops away from every other host in a data
center.
Answer: AD
65.What are the last two steps of business continuity planning? (Choose two.)
A. know your network
B. test the plan
C. formulate the plan
D. assess the risks
Answer: BC
66.Which two statements are true regarding chassis clustering? (Choose two.)
A. The chassis cluster uses a control link between the two nodes.
B. The chassis cluster uses an FXP0 link between the two nodes.
C. The chassis cluster must contain two identical MX Series devices.
D. The chassis cluster must contain two identical SRX Series devices.
Answer: AD
67.You are working on a service provider network. You will provide network services to multiple
companies across your network, while maintaining separation of traffic for different corporate entities.
What are two high-level design alternatives that will meet your requirement? (Choose two.)
A. IPsec VPN
B. VRRP
C. MSDP
14 / 53
The safer , easier way to help you pass any IT exams.
D. MPLS
Answer: AD
68.The modular requirements RFP element contains which two items? (Choose two.)
A. Hierarchical design considerations
B. Number of wireless connections needed
C. Traffic analysis
D. Functionality of each module within the design
Answer: AD
69.What are two aspects of greenfield projects? (Choose two.)
A. New networks with few or no restraints to consider.
B. Old equipment that should be replaced.
C. Legacy applications that are no longer used.
D. Next-generation networks created from the ground up.
Answer: AD
70.Which two groups within the IT organization will likely need training if a new type of network
equipment is deployed throughout the enterprise? (Choose two.)
A. application development
B. systems administrators
C. network engineering
D. network operations
Answer: CD
71.What are two requirements that every RFP response should include? (Choose two.)
A. a support plan that includes details about servicing the components once operational
B. a detailed competitor comparison document that indicates the proposed design is the least expensive
option
C. a detailed forecast of exception handling after the design has been implemented and is operational
D. an implementation plan that includes a description of how the design will be implemented
Answer: AD
72.Which two items must be included in an RFP include? (Choose two.)
A. A list of design requirements.
B. The new design of the network.
C. An analysis of application behavior in the network.
D. The types of solutions the design must provide.
Answer: AD
73.You want to use standard cabling instead of crossover cabling in an environment without MDIX.
In which two situations would this apply? (Choose two.)
A. server-to-switch
B. computer-to-switch
15 / 53
The safer , easier way to help you pass any IT exams.
C. computer-to-computer
D. switch-to-switch
Answer: AB
74.Which design boundary is caused by the customer's existing physical environment?
A. Marketing users are not permitted access to the company's financial servers.
B. Current infrastructure lacks the media to interconnect buildings with each other.
C. Key stakeholders disagree on how the funding for the project should be spent.
D. HTTP traffic is expected to increase on the network by 57% over the next two years.
Answer: B
75.Which two items are key RFP elements? (Choose two.)
A. Physical design requirements
B. Modular requirements
C. Logical design requirements
D. Connectivity and throughput requirements
Answer: BD
76.You need to deploy an IPsec VPN technology that provides low application latency when a remote
office is communicating with another remote office. This solution must also provide low management
overhead.
Which IPsec VPN technology should you choose for this design?
A. SSL VPN
B. full mesh VPN
C. hub-and-spoke VPN
D. ADVPN
Answer: D
77.You are developing a network monitoring strategy to track network response time and availability. The
monitoring strategy should be scalable to accommodate future network growth.
Which two statements are true in this scenario? (Choose two.)
A. Network reachability monitoring functions should be centralized to a dedicated monitoring device.
B. RPM allows the monitoring of reachability, but does not allow delay or jitter monitoring.
C. Network reachability monitoring functions should be delegated to each network device.
D. RMON is a standardized system that is not vendor specific.
Answer: AD
78.You customer requires a solution that allows remote home workers to access resources at the
corporate headquarters securely.
Which technology would you recommend?
A. ADVPN
B. hub-and-spoke VPN
C. full mesh VPN
D. SSL VPN
16 / 53
The safer , easier way to help you pass any IT exams.
Answer: D
79.You are evaluating an existing network to determine requirements for a network upgrade. In this
scenario, which statement is true?
A. A network baseline identifies devices that do not have redundant components.
B. A network baseline identifies traffic growth patterns across network devices.
C. A network baseline identifies how many users are connected to the network.
D. A network baseline identifies the type and level of traffic load on the network.
Answer: D
80.You are asked to deploy VPNs in your network.
What are two deployment models you would use? (Choose two.)
A. site to site
B. hub and spoke
C. overlay
D. hierarchical
Answer: AB
81.Which two statements properly describe Junos event scripts? (Choose two.)
A. Junos event scripts are triggered manually.
B. Junos event scripts are triggered automatically.
C. Junos event scripts can be used to monitor the overall status of the device.
D. Junos event scripts cannot be used to monitor the overall status of the device.
Answer: BC
82.An RFP response should include which three items (Choose three.)
A. Executive summary
B. Bill of materials
C. A solution overview
D. technical specifications
Answer: ACD
83.A customer wants to implement an automation system that can update BGP routes without commits
and can make hundreds of changes per minute.
Which Junos automation tool would accomplish this task?
A. REST Explorer
B. JSNAPy
C. JET
D. event scripts
Answer: C
84.Your customer has indicated that they are about to acquire another organization and integrate that
acquisition into their corporation.
Which two major areas must be examined as part of the network design? (Choose two.)
17 / 53
The safer , easier way to help you pass any IT exams.
A. scale constraints of existing hardware
B. regulatory approval of the takeover
C. restructuring of staff responsibilities
D. protocol incompatibilities
Answer: AD
85.You are examining the customer’s IT organization and its responsibilities to determine how it will be
impacted by your design. In this scenario, which three business functions are typically provided?
(Choose three.)
A. network architecture and design
B. compute resourceprovisioning
C. manufacturing
D. network operations
E. product marketing
Answer: ABD
86.What are two reasons why you would send an RFP to multiple vendors (Choose two.)
A. to eliminate vendors who cannot meet the requirements
B. to warranty the process against fraud
C. to satisfy international law requiring a minimum of three vendors
D. to compare competing proposals
Answer: AD
87.You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables.
What is the maximum distance between the Ethernet switches?
A. 100 feet
B. 1000 feet
C. 100 meters
D. 1000 meters
Answer: C
88.You are designing a network management strategy for a new network.
The requirements for the management of network devices are shown below:
- Administrator passwords must have an expiration date.
- Administrators must be assigned role-specific privileges on each device.
In this scenario, which statement is true?
A. Local authentication must be used on each device.
B. A centralized AAA system must be used for authentication.
C. All devices must be configured with the same privilege levels.
D. Each user must have a unique login account.
Answer: B
89.Network Director is an example of which type of network management application?
A. on-box
18 / 53
The safer , easier way to help you pass any IT exams.
B. out-of-band
C. centralized
D. op script
Answer: C
90.Why would you recommend Junos Space Security Director in a network design?
A. It simplifies Ethernet switch deployments and provides rapid operation of campus and data center
networks.
B. It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services.
C. It helps administrators to more quickly and intuitively manage all phases of a security policy life cycle
D. It provides detection, isolation, and resolution of network faults and incidents.
Answer: C
91.Which statements is true in regards to the Assess the Risks step of business continuity planning?
A. You should list all the functions and services in the network.
B. You should perform a business impact analysis.
C. You should perform a risk assessment.
D. You should develop a plan of action to mitigate the risks.
Answer: C
92.A customer has determined the need to upgrade the network so that the packaging and shipping
facilities can meet current demand. The customer has voiced concerns that the network design and
implementation cannot affect current sales in any way.
What are two ways to address this concern in your network design? (Choose two.)
A. Create continuity plans.
B. Collect job aids.
C. Define security measures.
D. Analyze packet flow.
Answer: AD
93.As part of your automation design, you need an off-box system that will be able to monitor telemetry
information. You must then use that information to dynamically update devices as needed to ensure
optimal network traffic flow.
Which automation solution would accomplish this goal?
A. Ruby
B. SaltStack
C. Chef
D. Puppet
Answer: D
94.When implementing a top-down design methodology, where would you begin collecting information to
start the design process?
A. the CEO of the corporation
B. the Application Layer of the OSI model
19 / 53
The safer , easier way to help you pass any IT exams.
C. the currently-owned network equipment
D. the WAN edge
Answer: B
95.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. ISIS
B. LACP
C. GLBP
D. PAgP
Answer: AB
96.You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. Virtual Chassis for EX devices.
B. High bandwidth uplink.
C. Redundant power supplies for network devices.
D. SFP interfaces.
Answer: AC
97.You must design a network for a large campus building with many users who are in different
departments.
Which technology should you use for your design?
A. VLAN
B. GRE
C. BGP
D. RIP
Answer: A
98.You are working with a customer who specializes in selling custom toy boxes in more than 50 stores.
The customer’s financial information must be kept secure.
Which security standard should you include in your design proposal?
A. user-based firewall
B. NAC
C. BYOD
D. PCI compliance
Answer: D
99.What are three components used to enforce 802.1X in your design? (Choose three.)
A. authenticator
B. VoIP phone
C. authentication server
D. supplicant
20 / 53
The safer , easier way to help you pass any IT exams.
E. edge router
Answer: ACD
100.When discussing network reliability, what does the term “five nines” mean?
A. The network is up 99.999% of the time.
B. The network is up .99999% of the time.
C. The network is up 9.9999% of the time.
D. The network is up .09999% of the time.
Answer: A
101.What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.)
A. plan
B. build
C. buy
D. oversee
Answer: AB
102.Which Junos Space application can be used to manage L3 VPNs on MX devices?
A. Security Director
B. Log Director
C. Network Director
D. Connectivity Services Director
Answer: D
103.What are two phases of assessment when designing network security? (Choose two.)
A. to layout a logical design
B. to layout a physical design
C. to identify requirements
D. to perform data analysis
Answer: AC
104.Which two reasons show the importance of understanding a user's applications when designing a
network solution? (Choose two.)
A. The network engineer can infer traffic patterns.
B. Network management can be optimized for specific applications.
C. Quality of service (QoS) can be optimized for specific applications.
D. Network virtualization might not support all real-time applications.
Answer: AC
105.What should be the fourth item in your network design checklist?
A. A validation process for analyzing customer's existing environment.
B. A process for selecting protocols, address schemes, naming conventions, and so forth.
C. A process for understanding the customer's business and technical goals.
D. The steps for designing a network topology.
21 / 53
The safer , easier way to help you pass any IT exams.
Answer: B
106.Your campus network is rolling out a BYOD policy. Your design must ensure that guest users are
restricted from accessing internal network resources.
Which two actions would solve this problem? (Choose two.)
A. Guest users should be placed in an isolated guest routing instance.
B. Guest users should be placed in an isolated guest VLAN.
C. Guest users should be placed in a non-isolated guest routing instance.
D. Guest users should be placed in a non-isolated guest VLAN.
Answer: AB
107.VLANs provide separation of which type of domain?
A. collision domains
B. multicast domains
C. broadcast domains
D. routing domains
Answer: C
108.Which popular data center architecture provides improved availability between two switching nodes?
A. MPLS traffic engineering
B. multichassis link aggregation
C. 802.1br
D. fabric Clos architecture
Answer: D
109.In which two situations does physical device redundancy make sense in a network design? (Choose
two.)
A. When zero impact to users and applications is required during device failures.
B. When device failures in the customer's WAN provider are a possibility.
C. When downtime is not acceptable for device upgrades.
D. When server load in the DMZ is a is higher than normal.
Answer: AC
110.You are asked to provide a network design for a project which spans the needs of multiple
organizational entities.
Which key contact will you need to help define success for this activity?
A. the project manager overseeing all network development activities
B. the accounting standards department head
C. the human resources staff manager
D. the CFO responsible for strategic business development
Answer: A
111.Which automation tool can you use to automate Junos OS platforms?
A. PyEZ
22 / 53
The safer , easier way to help you pass any IT exams.
B. C#
C. PHP
D. SQL
Answer: A
112.You have designed a network in which all network devices have redundant power supplies.
However, the redundant power supplies are plugged into a single power source.
Which two statements are true? (Choose two.)
A. There is no problem and the power redundancy requirements are met.
B. The power redundancy requirements are not met as the single source of power could fail and the
network devices will not stay powered on.
C. The redundant power supplies should be plugged into separate power sources.
D. Redundant power supplies should always be plugged into the same power source.
Answer: BC
113.A local university has decided to expand their research capabilities and build a new research facility.
You have been hired to design and install the new network in this building.
The research team expects to generate massive amounts of data, which must be shared with other
facilities located on the same campus. Physical access to the building is restricted, and the connection to
the other buildings is private and direct.
What is your primary concern in the design of the network?
A. resiliency
B. security
C. encryption
D. scalability
Answer: B
114.When analyzing customer requirements, what are two of the categories that customer requirements
can be organized into? (Choose two.)
A. Core
B. Access
C. Security
D. Availability
Answer: CD
115.What are two valid reasons to implement a network management solution within your network
infrastructure? (Choose two.)
A. to increase network visibility
B. to eliminate the need for network planning
C. to reduce network operating expenditures
D. to reduce network capital expenditures
Answer: AC
116.What are two important considerations with respect to the customer's IT organization which might
23 / 53
The safer , easier way to help you pass any IT exams.
affect your design? (Choose two.)
A. availability of funding to increase IT staffing
B. staff expertise levels in the technology under consideration
C. reporting hierarchy of the IT support organization
D. availability of the IT telephone contact center
Answer: AB
117.You are asked to provide a design proposal for a service provider network. The design must ensure
that customers are able to send Layer 2 traffic between sites.
In this scenario, which VPN technology would be used to accomplish this task?
A. IPsec VPN
B. Layer 3 VPN
C. GRE
D. EVPN
Answer: D
118.What is an example of a port-based network access control protocol?
A. 802.1q
B. 802.1x
C. 802.3x
D. 802.1r
Answer: B
119.The business continuity RFP element contains which two requirements? (Choose two.)
A. Wired connection requirements
B. Traffic requirements
C. Network efficiency requirements
D. QoS requirements
Answer: CD
120.Which two statements properly describe Junos commit scripts? (Choose two.)
A. Junos commit scripts can enforce custom configuration rules.
B. Junos commit scripts cannot enforce custom configuration rules.
C. When a candidate configuration is committed, only the first active commit script is used.
D. When a candidate configuration is committed, all active commit scripts are used.
Answer: AD
121.A regional retail store has requested a WAN upgrade proposal. You have been collecting their
requirements.
Which three inputs would be included in your proposal? (Choose three.)
A. in-store WiFi
B. existing network environment
C. level of virtualization
D. number of stores
24 / 53
The safer , easier way to help you pass any IT exams.
E. budget
Answer: BDE
122.Which three elements would affect user data flows in a customer’s existing network? (Choose
three.)
A. QoS policies
B. budget
C. log collection
D. traffic behavior
E. existing applications
Answer: ADE
123.What are three use cases for Data Center Interconnect? (Choose three.)
A. security
B. Layer 2 extension
C. disaster recovery
D. geoclustering
E. ease of management
Answer: BCE
124.Exhibit:
Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.)
A. You can use VRRP on the SRX devices to WAN connections.
B. You can use VRRP on the SRX devices for users in Group-A.
C. You can use VRRP on the SRX devices for users in Group-B.
D. You can use VRRP on the SRX devices for users in Group-C.
Answer: AC
25 / 53
The safer , easier way to help you pass any IT exams.
125.Which two statements are correct in regards to modularity in your network design? (Choose two.)
A. Modularity facilitates future growth and troubleshooting efforts.
B. Modularity provides hierarchical structure to your design.
C. Modularity provides a flat structure to your design.
D. Modularity can stop future growth and troubleshooting efforts.
Answer: AB
126.What should be the second item in your network design checklist?
A. A validation process for analyzing customer's existing environment.
B. A process for selecting protocols, address schemes, naming conventions, and so forth.
C. A process for understanding the customer's business and technical goals.
D. The steps for designing a network topology.
Answer: A
127.In which two situations does power supply redundancy make sense in a network design? (Choose
two.)
A. when using an SRX320
B. when redundant power sources are not present on site
C. when redundant power sources are present on site
D. when a two-device HA solution is not possible
Answer: CD
128.Which statement is true in regards to VRRP?
A. The maximum number of routing devices in a VRRP group is two.
B. The maximum number of routing devices in a VRRP group is three.
C. The maximum number of routing devices in a VRRP group is four.
D. The maximum number of routing devices in a VRRP group is ten.
Answer: A
129.Which two statements are true in regards to the Test the Plan step of business continuity planning?
(Choose two.)
A. You should test the plan hypothetically on paper.
B. You should test the plan in full-fledged live exercises.
C. You should only test the plan if the risk-assessment shows that more than 10% of the customer's
revenue is at risk.
D. You should only test the plan if the risk-assessment shows that more than 20% of the customer's
revenue is at risk.
Answer: AB
130.You are the network architect with a large banking institution with operations around the world. Any
outage results in lost revenue for your company, and may result in lost customers. Network uptime is
your top priority.
What should be your focus?
26 / 53
The safer , easier way to help you pass any IT exams.
A. return on investment
B. capacity planning
C. business continuity
D. service virtualization
Answer: C
131.You have an access switch that must connect to an aggregation switch. The two switches are 2,600
feet (800 meters) apart.
Which type of media would be used to connect the Layer 2 switches?
A. multimode fiber
B. single-mode fiber
C. cat5 cable
D. cat6E cable
Answer: B
132.In a Virtual Chassis Fabric, which two platforms are supported? (Choose two.)
A. EX Series
B. MX Series
C. SRX Series
D. QFX Series
Answer: AD
133.What would be used to understand the types of applications on the network and how often those
applications are used?
A. logical topology
B. trust and untrust zones
C. traffic flow analysis
D. routing policies
Answer: C
134.Which three critical design blocks or functional areas benefit from HA design solutions? (Choose
three.)
A. data center
B. campus
C. WAN
D. home office
E. collocation
Answer: ABC
135.What are two valid reasons to enable route summarization? (Choose two.)
A. to benefit from a hierarchical IP addressing plan
B. to enable the use of more than one routing protocol
C. to reduce routing overhead
D. to reduce the coexistence of BGP with IGPs
27 / 53
The safer , easier way to help you pass any IT exams.
Answer: AC
136.You are planning to add equipment into a data center environment.
What are three physical environmental considerations? (Choose three.)
A. IP addressing
B. floor loading
C. rack door positioning
D. VLAN assignments
E. hot/cold aisle deployment
Answer: BCE
137.What are two characteristics of using the Virtual Chassis technology in the aggregation tier of a data
center? (Choose two.)
A. You can fully use all up-links from the access tier.
B. It increases the control plane complexity.
C. If reduces the control plane complexity.
D. You cannot fully use all up-links from the access tier.
Answer: AC
138.What are two main data center profile solution templates? (Choose two.)
A. adaptive
B. transitional
C. high-performance computing
D. enterprise IT
Answer: CD
139.What type of device can be installed to increase a broadcast domain?
A. router
B. switch
C. IDS
D. IPS
Answer: B
140.What information is included in an RFP issuance?
A. design requirements
B. product features
C. product positioning
D. COGS pricing
Answer: A
141.Your corporate campus consists of a single large building with several thousand users. Functional
groups are each located in a separate area of the building with their proprietary data hosted locally.
Some communication occurs between the various groups and must be tightly restricted.
Which technology should be used to accomplish this task?
28 / 53
The safer , easier way to help you pass any IT exams.
A. intrusion prevention system
B. firewall
C. router
D. switch
Answer: B
142.Which of the two statements are true in regards to campus redundancy best practices? (Choose
two.)
A. You must include highly available redundant connections for all applications in your design.
B. You need to include hardware redundancy in your design.
C. Wire-line reliability is not necessary for the wireless clients in your design.
D. Redundancy of wireless access points in unnecessary in your design.
Answer: AB
143.You customer currently has a hub-and-spoke VPN but has seen that the forwarding capabilities of
the hub device being overwhelmed during times of high traffic between spoke devices. Also, due to
recent cutbacks, the IT staff is already overwhelmed.
What should you recommend as a solution?
A. Replace the hub-and-spoke VPN with a full mesh VPN.
B. Replace the hub-and-spoke VPN with a SSL VPN.
C. Replace the hub-and-spoke VPN with a full mesh MPLS VPN.
D. Replace the hub-and-spoke VPN with an ADVPN.
Answer: D
144.What are three relevant considerations for determining the appropriate amount of bandwidth for a
site? (Choose three.)
A. applications used at that site
B. quantity of users at that site
C. equipment types at that site
D. available power at that site
E. square footage (or meters) for that site
Answer: ABC
145.What are two primary characteristics of the core tier in a network design? (Choose two.)
A. performance
B. inspection
C. reliability
D. manipulation
Answer: AC
146.Your customer is engaged in healthcare service support.
What are two considerations when designing their network? (Choose two.)
A. number of PoE switch ports
B. secure control of access to network components
29 / 53
The safer , easier way to help you pass any IT exams.
C. support for time stamping of data transfers
D. control of access to sensitive information
Answer: BD
147.Which two mechanisms allow administrators to authenticate on a Junos OS device? (Choose two.)
A. Active Directory
B. TACACS+
C. LDAP
D. RADIUS
Answer: BD
148.What are three ways to secure a customer’s network that includes several retail stores? (Choose
three.)
A. Isolate sensitive data from devices that access the network using security zones.
B. Ensure that the network meets PCI compliance.
C. Use 802.11g to isolate sensitive data from devices that access the network.
D. Secure cashier access from branch locations by requiring BYOD.
E. Provide guest access on a separate VLAN protected by NAC.
Answer: ABE
149.You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. How-swappable chassis components.
B. Redundant ACLs.
C. Redundant network devices
D. Copper interfaces.
Answer: AC
150.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. LLDP
B. PVST+
C. IGRP
D. RSTP
Answer: AD
151.Which two statements are true about separating production and management networks? (Choose
two.)
A. Separation simplifies data collection.
B. Separation complicates data collection.
C. Separation increases bandwidth contention.
D. Separation eliminates bandwidth contention.
Answer: BD
30 / 53
The safer , easier way to help you pass any IT exams.
152.You are working on a campus design for a customer who has acquired a building across the street
from the main facility.
The recently acquired building was built in 1979 and has not been updated to support the demands of
current network technologies. The building must support high-speed network connections for all users
working at the location.
Which two elements would you consider when analyzing connectivity and throughput requirements for
this new location? (Choose two.)
A. the hierarchical modules used within each group at the new location
B. the data received from a traffic analysis
C. the condition of the physical media at the new location
D. the type of business the customer is in
Answer: BC
153.You are in the process of developing a business continuity plan for your network design. You must
analyze data about weather patterns, maintenance history pertaining to leased buildings, and the
frequency of power failures.
For which purpose would you collect this information?
A. risk assessment
B. redundancy
C. high availability
D. disaster recovery
Answer: A
154.Which two statements are true regarding a Virtual Chassis? (Choose two.)
A. A Virtual Chassis must be configured on the same series but not the same model.
B. A Virtual Chassis supports up to 10 participating devices.
C. A Virtual Chassis supports only two participating devices
D. A Virtual Chassis can be configured on mixed series and models.
Answer: BD
155.You are asked to provide a design proposal for a data center environment. As part of your solution,
you are asked to simplify the management of the ToR EX Series switches.
In this scenario, which solution will accomplish this requirement?
A. Clos fabric
B. MC-LAG
C. Virtual Chassis
D. VRRP
Answer: C
156.You are planning a data center deployment of Juniper Networks switches interconnected into a
Virtual Chassis Fabric at 40 Gbps.
Which three choices are available to interconnect the switches within the 23 feet (7 meters) distance
limitation imposed by the data center? (Choose three.)
31 / 53
The safer , easier way to help you pass any IT exams.
A. direct attach copper
B. active optical fiber
C. passive optical fiber
D. SFP
E. cat6E
Answer: ABC
157.Junos Space Security Director is an example of which type of network management solution?
A. on-box
B. op script
C. event script
D. centralized
Answer: D
158.You are consulting on the redesign for a large retail network. The customer has dozens of locations,
all connected to a central data center.
Which two requirements would you expect from you customer? (Choose two.)
A. resiliency to ensure continuous operation
B. WAN aggregation using Internet-based VPN
C. very high throughput at every location
D. distributed network management
Answer: AB
159.You are asked to examine the infrastructure requirements needed to provision a new network build
in support of a customer who wants to take advantage of their service provider’s MPLS/VPN offering.
Which three considerations would be relevant to this work? (Choose three.)
A. supplicant roles in the current network layout
B. server hypervisor and host OS selection
C. backdoor connectivity requirements
D. IGP protocols deployed in the customer environment
E. site-to-site versus site-to-hub communications
Answer: CDE
160.What would be a Juniper Networks best practice for a network management network?
A. Keep the out-of-band management network as flat and simple as possible.
B. Use spanning tree to prevent loops within the out-of-band management network.
C. Use in-band network management.
D. Have a multi-tier out-of-band management network.
Answer: D
161.What are two tiers used in a traditional data center design? (Choose two.)
A. core
B. aggregation
C. compute
32 / 53
The safer , easier way to help you pass any IT exams.
D. user
Answer: AB
162.What is the function of the access tier in a traditional Layer 2 network environment with dispersed
VLAN connectivity requirements?
A. The access tier provides network connectivity to end-user devices and other hosts, and enforces
network access policy.
B. The access tier interfaces with lower tier devices and provides a high-speed interconnect with the
north-bound WAN edge device.
C. The access tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3
gateway services for the network.
D. The access tier relays packets between the lower tier Layer 2 devices and functions as the gateway to
the upper tier device.
Answer: A
163.What are three examples of physical security? (Choose three.)
A. security cameras
B. access door keypads
C. a mantrap
D. man in the middle
E. intrusion detection and prevention
Answer: ABC
164.You are the network administrator for a large university, and are ready to upgrade your network. You
want to solicit multiple vendors for design suggestions to help you define your plan moving forward.
Which two methods should you employ? (Choose two.)
A. Publish an RFP to key vendors.
B. Publish an RFI to key vendors.
C. Attend industry conferences.
D. Require your reseller to submit a BOM.
Answer: BC
165.Which two statements are true in regards to design proposals? (Choose two.)
A. You should add as much complexity as possible to your design proposal..
B. You should keep your design proposal as simple as possible.
C. You should create the physical design before the physical design.
D. You should create the logical design before the physical design.
Answer: BD
166.You are planning to upgrade the core network infrastructure at your corporation. This upgrade will
require a number of advanced features to support your requirements. You do not want any proprietary
protocols in the new design.
Which three technologies would you include in the design? (Choose three.)
A. VPLS
33 / 53
The safer , easier way to help you pass any IT exams.
B. MACsec
C. FabricPath
D. VXLAN
E. EtherChannel
Answer: ABD
167.Which two statements are true in regards to the solution overview section of an RFP? (Choose two.)
A. It contains the bill of materials.
B. It is an overview of Juniper's value proposition to the customer.
C. It should outline the technical benefits of the proposed design.
D. It should address the customer's goals, scope, and requirements.
Answer: CD
168.Which three options are effective ways of gathering data about the customer's current networking
environment? (Choose three.)
A. questionnaires
B. interviews
C. social media
D. job aids
Answer: ABD
169.Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network.
Which solution would you propose in this situation?
A. Security Director: Logging and Reporting
B. Contrail Cloud
C. Juniper Secure Analytics
D. Connectivity Services Director
Answer: C
170.What is the function of the core tier in a traditional three tier Layer 2 network environment?
A. The core tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway
services for the network.
B. The core tier interfaces with lower tier devices and provides a high-speed interconnect with the northbound WAN edge device.
C. The core tier provides network connectivity to end-user devices and other hosts and enforces network
access policy.
D. The core tier relays traffic between the lower tier Layer 2 devices and functions as the gateway to the
upper tier device.
Answer: B
171.What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
A. Multiple devices are inter-connected into a single logical device.
34 / 53
The safer , easier way to help you pass any IT exams.
B. One devices is broken up into multiple logical devices.
C. It supports up to 10 Gbps interfaces.
D. It supports up to 40 Gbps interfaces.
Answer: AC
172.A company requires a managed WAN solution that supports Layer 2 adjacency across remote
offices for applications and services.
What solution should be selected?
A. DMVPN
B. MPLS
C. VPLS
D. FR
Answer: C
173.The business requirements RFP element contains which two items? (Choose two.)
A. A summary the type of business the customer is in.
B. An explanation of why a new design is required.
C. A detailed report that describes the facility specifications.
D. The number of users and workstation requirements.
Answer: AB
174.Your customer is a growing enterprise with limited capital to invest in network expansions.
They have noticed performance problems in their campus LAN, which have been traced back to a high
oversubscription ratio between the aggregation and core layers. The customer’s aggregation and core
switches are connected using a single 1GbE connection.
Which solution improves network performance?
A. Add additional 1GbE connections between the aggregation and core layers with LACP.
B. Add additional 1GbEconnections between the aggregation and core layers with MACsec.
C. Add additional 1GbE connections between the aggregation and core layers with PNAC.
D. Add additional 1GbE connections between the aggregation and core layers with LLDP.
Answer: A
175.Connectivity issues have been seen by the users in remote offices when attempting to access
resources at the corporate headquarters. You must design a fix for this issues.
Which technology should you include in your design?
A. hub-and-spoke VPN
B. auto-discovery VPN
C. redundant WAN links
D. accelerated WAN links
Answer: C
176.What does the network MTTR measure?
A. the length of time it takes to design the network
B. the length of time to build the network
35 / 53
The safer , easier way to help you pass any IT exams.
C. the length of time to repair the network
D. the length of time it takes to reboot the network devices
Answer: C
177.Which two statements are true in regards to design proposals? (Choose two.)
A. Security only needs to be considered after the network is in place and functioning.
B. Security should be considered throughout the design process.
C. You design proposal should be clearly documented.
D. There is no need to document your design proposal.
Answer: BC
178.What does the network MTBF indicate?
A. the speed of the network
B. the reliability of the network
C. the age of the network
D. the cost of the network
Answer: B
179.Which statements is true in regards to the Formulate the Plan step of business continuity planning?
A. You should list all the functions and services in the network.
B. You should perform a business impact analysis.
C. You should perform a risk assessment.
D. You should develop a plan of action to mitigate the risks.
Answer: D
180.Which application would be used to manage Juniper EX Series switches?
A. Network Director
B. Security Director
C. Log Manager
D. Services Activation Director
Answer: A
181.You are consulting in a network architect role for a multinational corporation. As part of your contract,
you have been asked to propose an update to the company’s network design. You have completed the
initial design draft.
Which statement describes what you should do next in your project?
A. Begin to plan for a proof-of-concept demonstration to show why your design is superior to the current
network.
B. Schedule a time with the board of directors to present the proposed solution.
C. Schedule the first phase of implementation.
D. Share the design with the other network administrators and solicit feedback.
Answer: D
182.Which automation tool can you use to automate Junos OS platforms?
36 / 53
The safer , easier way to help you pass any IT exams.
A. HTML2.0
B. OpenView
C. Chef
D. Janus
Answer: C
183.Your customer is a government organization with strict security requirements. They want to expand
their Layer 2 infrastructure between multiple buildings within the same campus environment.
They also want to ensure that no unauthorized devices are connected between the switches in the
different buildings.
Which solution ensures data security in this environment?
A. Use PNAC on all inter-switch connections.
B. Use LLDP on all inter-switch connections.
C. Use LACP on all inter-switch connections.
D. Use MACsec on all inter-switch connections.
Answer: A
184.You are asked to provide a WAN design proposal for connecting together multiple customer sites. As
part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure.
Which statement is true about the proposed solution?
A. IPsec packets can be fragmented once encrypted.
B. IPsec tunnels will require an MPLS infrastructure through the WAN.
C. IPsec can require MTU modifications to accommodate the additional overhead.
D. Packets that are passed through an IPsec tunnel are not encrypted.
Answer: C
185.You are gathering information to determine capacity, density, and scaling of systems for a campus
switching design.
What information is critical to the design? (Choose three.)
A. the number of users with a fixed desktop station and attached IP phone
B. the number of users that are home office/mobile workers
C. the number of guest users or contractors accessing with a mobile hot spot
D. the number of physical VolP phones not connected to a desktop
E. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS machines)
Answer: ADE
186.What are two rules you should follow when writing an executive summary of an RFP? (choose two.)
A. Give a history of Juniper Networks.
B. Canned responses are ok to use.
C. Focus on organizational issues.
D. Keep it short and simple.
Answer: CD
187.You have been tasked to determine the capacity and scaling of systems for a campus switching
37 / 53
The safer , easier way to help you pass any IT exams.
design.
Which two statements are true? (Choose two.)
A. The average number of wireless devices that will be connecting to the network.
B. The number of guest users.
C. The number of remote workers.
D. The average bandwidth usage of users.
Answer: AD
188.Which two metrics are important for determining the size and scope of a new network design?
(Choose two.)
A. implementation time frame
B. number of users
C. location of users
D. training requirements
Answer: BC
189.What is the name of Juniper’s network management platform?
A. Junos
B. Junos Space
C. MX Series
D. Juniper Secure Analytics (JSA)
Answer: B
190.In which two situations does a backup WAN link with another provider make sense in a network
design? (Choose two.)
A. You want to combine both WAN links in a LAG to increase throughput.
B. When the users in the network rely on communication through email.
C. When the users in the network rely on communication through VoIP.
D. When the cost of a second link is less than the cost of downtime.
Answer: CD
191.When analyzing customer requirements, what are three of the categories that customer
requirements can be organized into? (Choose three.)
A. Edge
B. Performance
C. Scalability
D. Manageability
Answer: BCD
192.What should be included in a network design to improve resiliency?
A. climate control systems
B. redundant power supplies
C. out-of-band management
D. in-band management
38 / 53
The safer , easier way to help you pass any IT exams.
Answer: B
193.What is the function of the aggregation tier in a traditional three tier Layer 2 network environment?
A. The aggregation tier interfaces with lower tier Layer devices and provides a high-speed interconnect
with the north-bound WAN edge device.
B. The aggregation tier relays packets between the lower tier Layer 2 devices and functions as the
gateway to the upper tier Layer 2 device.
C. The aggregation tier provides network connectivity to end-user devices and other hosts and enforces
network access policy.
D. The aggregation tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3
gateway services for the network.
Answer: B
194.Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all
the links between the access tier and the aggregation tier are used.
What should you do to accomplish this task?
A. Use VRRP on Agg-1 and Agg-2.
B. Place Agg-1 and Agg-2 in a Virtual Chassis
C. Use RSTP on all devices.
D. Use BGP load balancing on all devices.
Answer: B
195.In a bring-your-own-device deployment, where would non-authenticated users be placed?
A. C-VLAN
B. guest VLAN
C. production VLAN
D. S-VLAN
Answer: B
196.Your company’s network consists of your headquarters location plus several dozen remote offices.
Remote office users are often unable to access data housed in the headquarters data center due to
39 / 53
The safer , easier way to help you pass any IT exams.
connectivity issues.
You must update the network to provide reliable access to corporate assets for remote office users.
Which technology is critical to your design project?
A. IPsec
B. WAN acceleration
C. WAN aggregation
D. QoS
Answer: A
197.What is the first step of business continuity planning?
A. know your network
B. test the plan
C. assess the risk
D. formulate the plan
Answer: A
198.You are performing a risk assessment for a network design.
Which statement is true in this scenario?
A. Some risks can be safely ignored.
B. The likelihood of a risk occurring should not be considered.
C. A network must be designed for an uptime of five nines.
D. All identified risks must have a mitigation plan in place.
Answer: A
199.Which two elements of customer data would you use to determine the applications that your
customer uses most often? (Choose two.)
A. corporate policies
B. interviews
C. questionnaires
D. business goals
Answer: BC
200.Which solution would ensure that voice traffic is treated with a higher priority than data traffic
throughout a network?
A. class of service
B. routing instance
C. 802.1Q VLAN tags
D. link aggregation
Answer: A
201.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. VTP
40 / 53
The safer , easier way to help you pass any IT exams.
B. MSTP
C. IGMPv3
D. CGMP
Answer: BC
202.SRX Series devices support which type of HA feature?
A. logical systems
B. HSRP
C. chassis clustering
D. Virtual Chassis
Answer: C
203.Your corporate campus consists of a single large building with several thousand users.
Employees are located randomly throughout the building. Accounting employees are mixed in with
engineers and sales. You want to separate users into functional groups.
Which technology should be used to accomplish this task?
A. VLAN
B. MPLS
C. OSPF
D. IPsec
Answer: A
204.You are asked to propose a security solution that integrates with OpenStack, Kubernetes, and
OpenShift.
Which Juniper Networks product will work in this scenario?
A. Sky ATP
B. SDSN
C. Contrail Security
D. JSA
Answer: C
205.Which two features would cause latency in a WAN connection? (Choose two.)
A. IPS
B. syslog
C. telemetry
D. UTM antivirus
Answer: AD
206.Which Juniper automation tool enables administrators to write custom Python scripts that use the
Junos XML API?
A. REST Explore
B. JSNAPy
C. JET
D. PyEZ
41 / 53
The safer , easier way to help you pass any IT exams.
Answer: D
207.Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network.
Which solution would you propose in this situation?
A. Security Director: Logging and Reporting
B. Contrail Cloud
C. Juniper Secure Analytics
D. Connectivity Services Director
Answer: C
208.Your customers new data center contains network devices from multiple vendors. You have been
asked to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. MACsec
B. CDP
C. VXLAN
D. EIGRP
Answer: AC
209.You are asked to secure a branch location in your network.
Which two actions would accomplish this task? (Choose two.)
A. Configure an IPsec VPN back to headquarters.
B. Configure MC-LAG on the branch’s edge router.
C. Separate VLANs for each user group.
D. Configure OSPF areas in the core.
Answer: AC
210.In which network location should an external DNS server be placed?
A. campus data center
B. enterprise branch
C. internet
D. remote access
Answer: C
211.Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party
network switches to block a threat in real time?
A. Policy Enforcer
B. Sky ATP
C. Juniper Secure Analytics
D. SRX Series device
Answer: B
42 / 53
The safer , easier way to help you pass any IT exams.
212.In an SRX Series environment, what would you use to manage your network's firewall policy?
A. Virtual Director
B. Security Director
C. Network Director
D. Services Activation Director
Answer: B
213.What is the maximum length recommended for a single cat6E cable?
A. 328 feet (100 meters)
B. 1000 feet (300 meters)
C. 3280 feet (1000 meters)
D. 100 feet (30 meters)
Answer: A
214.Which Junos Space application can be used to manage VLANs on EX devices?
A. Security Director
B. Log Director
C. Network Director
D. Connectivity Services Director
Answer: C
215.The environmental requirements RFP element contains which two items? (Choose two.)
A. A summary the type of business the customer is in.
B. An explanation of why a new design is required.
C. A detailed report that describes the facility specifications.
D. The number of users and workstation requirements.
Answer: CD
216.Which Junos Space application can be used to store and manage events for SRX devices?
A. Network Management Platform
B. Security Director: Logging and Reporting
C. Network Director
D. Connectivity Services Director
Answer: B
217.Which Junos Space application can be used to manage the security features of the SRX devices?
A. Security Director
B. Log Director
C. Network Director
D. Connectivity Services Director
Answer: A
218.Which network model would be appropriate for a 30-story building occupied by a single enterprise?
A. data center network
43 / 53
The safer , easier way to help you pass any IT exams.
B. campus network
C. branch office network
D. service provider network
Answer: B
219.What are two features used to enable high availability? (Choose two.)
A. VRRP
B. chassis clustering
C. full duplex mode
D. SNMP
Answer: AB
220.Your customer is building a new data center and the applications require very low latency.
Which fabric architecture would you recommend?
A. hub-and-spoke
B. spine-and-leaf
C. three tier
D. four tier
Answer: B
221.You are reviewing an existing corporate network design with a plan to reduce the number of data
centers deployed by a customer.
Which three considerations are relevant to this exercise? (Choose three.)
A. data repositories/distribution
B. data center interconnects
C. cable plant infrastructure
D. high availability considerations
E. RFC1918 addressing
Answer: ABD
222.An application uses broadcast traffic to send data to IPv4 hosts.
How can the application communicate using IPv6?
A. Anycast
B. Unicast
C. Broadcast
D. Multicast
Answer: A
223.What are the two main sub-phases of the plan methodology? (Choose two.)
A. Access
B. Scope
C. Design
D. Build
Answer: AC
44 / 53
The safer , easier way to help you pass any IT exams.
224.You must provide role-based access to a particular network resource.
Which equipment would you use to accomplish this task?
A. core router
B. server load balancer
C. network firewall
D. SIEM
Answer: C
225.What are three considerations for network capacity planning? (Choose three.)
A. number of users
B. application behavior
C. user locations
D. network management platform
E. security regulations
Answer: ABC
226.Which three steps are part of business continuity planning? (Choose three.)
A. Assess the risks
B. Know your staff.
C. Know your network.
D. Understand your tools.
E. Test the plan
Answer: ABC
227.You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. bit level redundancy
B. multiple physical uplinks
C. LAGs towards the LAN.
D. redundant REs for SRX devices.
Answer: BC
228.In regards to a Junos Space deployment, which two statements are true?
A. Junos Space can only communicate with devices through it's eth0 interface.
B. Junos Space can only communicate with devices through it's eth3 interface.
C. Junos Space typically uses the eth0 interface to manage devices through the OOB network.
D. Junos Space typically uses the eth3 interface to manage devices through the in-band network.
Answer: CD
229.Exhibit:
45 / 53
The safer , easier way to help you pass any IT exams.
Referring to the exhibit, what should you do to increase high availability in the network?
A. Increase the number of connections between the core and access switches.
B. Make a connection between each access switch.
C. Make a connection between each core switch.
D. Connect each server to two access switches.
Answer: D
230.What are two popular WAN service offerings that you would use in your design? (Choose two.)
A. ARCnet
B. MPLS/VPN
C. token ring
D. SONET/SDH
Answer: BD
231.You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. Stateful failover for firewall platforms.
B. Chassis clusters for firewall platforms.
C. Stateless failover for firewall platforms.
D. Redundant firewall filters for firewall platforms.
Answer: AB
232.What are two guidelines when designing campus networks? (Choose two.)
A. The design must account for high control plane resources.
B. The design must allow for network resource availability.
C. The design must protect customer resources.
D. The design must allow for high bandwidth.
Answer: BC
233.What are two ways that a user's business model is important for network design purposes? (Choose
two.)
46 / 53
The safer , easier way to help you pass any IT exams.
A. It suggests certain budgetary and scheduling constraints.
B. It shows which vendors the user prefers.
C. It leads to customized application development, consulting requirements, or both.
D. It allows the engineer to infer certain technical requirements.
Answer: AD
234.Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI?
(Choose two.)
A. RSTP
B. GRE
C. EVPN
D. OSPF
Answer: B
235.Which compliance standard must be taken into account when designing a network that will be
handling credit card transactions?
A. HIPPA
B. PCI
C. FIPS
D. SOX
Answer: B
236.Which two pieces of information should be included in an RFP response? (Choose two.)
A. a list of contributing material including technical publications, training guides, and courseware used to
build the proposed design
B. design details including information about the devices, protocols, and technologies included in the
proposed design
C. configuration details including proposed devices, protocols, and technologies included in the
proposed design
D. a network topology including a high-level logical design as well as low-level physical design of the
proposed network
Answer: BD
237.You are designing a WAN implementation to securely connect two remote sites to the corporate
office. A public Internet connection will be used for the connections.
Which statement is true in this situation?
A. The connection should be secured using IPsec.
B. The WAN edge devices must support MPLS.
C. The connections support Layer 2 traffic bridging
D. The service provider can isolate traffic in a private MPLS instance.
Answer: A
238.What is the third step of the Juniper recommended executive summary structure of an RFP?
A. Identification of business benefits.
47 / 53
The safer , easier way to help you pass any IT exams.
B. Relevant supporting information outlining why the customer should choose your plan.
C. Overview of your proposed solution.
D. Introduction of the customer's need or problem.
Answer: C
239.You must design a network requires a VPN technology that employs low application latency between
spoke devices. The customer has also stated that they do not wish to use PKI certificates as a form of
authentication.
Which VPN technology should you recommend in this situation?
A. ADVPN
B. hub-and-spoke VPN
C. full mesh VPN
D. SSL VPN
Answer: C
240.Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network.
Which solution would you propose in this situation?
A. Security Director: Logging and Reporting
B. Contrail Cloud
C. Juniper Secure Analytics
D. Connectivity Services Director
Answer: C
241.You are asked to develop a high-level design to meet a customer's requirement to transition an
aging switched infrastructure to a newer approach, meeting their needs for the next five years.
In your presentation to the IT department, which three areas are important to define? (Choose three.)
A. recommendations for IGP timers
B. business costs of not going forward
C. configuration stanza for class of service definition
D. impact to the business from an operations perspective
E. cost of the proposed solution
Answer: BDE
242.You are asked to document the existing network and security infrastructure before a design update
project begins.
Which three actions would be appropriate as part of your documentation project? (Choose three.)
A. Survey all data centers and wiring closets.
B. Review the available documentation with the security administrators.
C. Review the available documentation with the server administrators.
D. Review the available documentation with the network administrators.
E. Review the available documentation with the purchasing department.
Answer: ABD
48 / 53
The safer , easier way to help you pass any IT exams.
243.What is the second step of the Juniper recommended executive summary structure of an RFP?
A. Identification of business benefits.
B. Relevant supporting information outlining why the customer should choose your plan.
C. Overview of your proposed solution.
D. Introduction of the customer's need or problem.
Answer: A
244.What are three types of automation scripts used on a Junos device? (Choose three.)
A. op scripts
B. commit scripts
C. boot scripts
D. event scripts
E. control scripts
Answer: ABD
245.What describes customer business requirements?
A. vision of future growth
B. complexity of the existing network
C. size of the facility
D. functionality of each module within a design
Answer: A
246.You are designing network connectivity into a mission critical site.
What are three design elements required to complete this design? (Choose three.)
A. diverse entrance facilities
B. firewall cluster
C. 802.11 wireless point-to-point
D. DSL/cable modem service
E. redundant Internet border routers
Answer: ABE
247.You are attempting to form a chassis cluster with an SRX340 and an SRX345 but the chassis cluster
formation is failing.
Why is the chassis cluster failing to properly form?
A. The SRX340 does not support chassis clustering.
B. The SRX model numbers must be the same to form a chassis cluster.
C. The SRX345 does not support chassis clustering
D. The SRX Series does not support chassis clustering.
Answer: B
248.A large insurance firm wants to design a network for 150 remote stores and branch offices.
What are three basic design approaches for the wide area network? (Choose three.)
A. fully meshed
49 / 53
The safer , easier way to help you pass any IT exams.
B. peer-to-peer
C. ring
D. partially meshed
E. hub-and-spoke
Answer: ADE
249.Which component triggers the quarantine of an infected endpoint?
A. ALG
B. firewall
C. Policy Enforcer
D. switch
Answer: C
250.Which two statements are true regarding chassis clustering? (Choose two.)
A. The chassis cluster uses a fabric link between the two nodes.
B. The chassis cluster uses an FXP10 link between the two nodes.
C. The chassis cluster nodes must be within 10 feet of each other.
D. The chassis cluster nodes can be located in different cities.
Answer: AD
251.What are three industry best practices for configuration management? (Choose three.)
A. Define a consistent device naming convention.
B. Use a central logging server.
C. Use the rollback feature frequently.
D. Back up all of the configurations frequently.
E. Use descriptive fields in device configurations.
Answer: ADE
252.A hospital has issued an RFP for a full network refresh. The RFP focuses on the users, applications,
and bandwidth.
Which two realistic assumptions would be inferred about this network? (Choose two.)
A. Regulatory requirements must be considered.
B. Network downtime will not be tolerated.
C. WiFi services must support video.
D. Quality of service (QoS) is not necessary.
Answer: AB
253.In your network design, you must ensure that all user sessions passing through an SRX Series
device remain active if there is a device failure.
Which mechanism will accomplish this design requirement?
A. chassis clustering
B. MC-LAG
C. Virtual Chassis
D. VRRP
50 / 53
The safer , easier way to help you pass any IT exams.
Answer: A
254.Which device plays the role of authenticator in an 802.1X design as shown in the exhibit?
A. Device C
B. Device A
C. Device D
D. Device B
Answer: A
255.Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
A. RSVP
B. EIGRP
C. PVST
D. LDP
Answer: AD
256.Which two statements are true in regards to network capacity planning? (Choose two.)
A. The application behavior is important.
B. The application behavior is not important.
C. The network management platform is not important.
D. The network management platform is important.
Answer: AC
257.You are designing a network in which access between different groups must be tightly restricted.
What should you do to accomplish this task?
A. Use a firewall with security policies to control the traffic.
B. Use a switch with Layer 2 ACLs to control the traffic.
C. User a router with Layer 3 ACLs to control the traffic.
51 / 53
The safer , easier way to help you pass any IT exams.
D. Use a Web filtering device to control Layer 7 traffic.
Answer: A
258.Which statement describes brownfield deployments?
A. Brownfield deployments allow for more modular and scalable design than greenfield deployments.
B. Brownfield deployments are commonly used and can be restrictive.
C. Brownfield deployments are considered more expensive than greenfield deployments.
D. Brownfield deployments use all new equipment.
Answer: B
259.You want to view logs and generate basic usage reports from network devices.
Which three tools would you use to satisfy the requirements? (Choose three.)
A. local logging on your PC
B. on-box logging
C. Junos Space Log Director
D. third-party log management
E. big data solutions using Hadoop
Answer: BCD
260.What should be the first item in your network design checklist?
A. A validation process for analyzing customer's existing environment.
B. A process for selecting protocols, address schemes, and naming conventions.
C. A process for understanding the customer's business and technical goals.
D. The steps for designing a network topology.
Answer: C
261.Which two data center network architectures might be proposed by other vendors to compete with
Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.)
A. TRILL
B. FCoE
C. SON ET 1
D. three-tier architecture
Answer: AD
262.Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network.
Which solution would you propose in this situation?
A. Security Director: Logging and Reporting
B. Contrail Cloud
C. Juniper Secure Analytics
D. Connectivity Services Director
Answer: C
52 / 53
The safer , easier way to help you pass any IT exams.
263.A service provider has requested that you develop a design for a new network deployment focused
on a call center customer.
What are two success criteria from the stakeholder’s point of view with respect to this network
deployment? (Choose two.)
A. easy deployment of the solution by the service provider
B. requirement for secure data transmissions
C. multicast stream replication must follow MSDP path
D. end user demand for low latency voice connections
Answer: BD
264.You are asked to secure the routing engine of all Junos devices in your design. The design should
not affect transit traffic.
Which action will accomplish this task?
A. Use a firewall filter on a revenue port.
B. Use a firewall filter on the loopback interface.
C. Use a firewall filter on the fxp0 interfaces.
D. Use a firewall filter on the management interface.
Answer: B
265.What are three environmental characteristics that affect the campus network design? (Choose
three.)
A. distribution of users
B. PC operating system
C. transmission media characteristics
D. locations of wiring closets
E. remote-site connectivity
Answer: ACD
266.In reviewing the customer’s IT organization, you must determine the corporate model for IT funding.
Which two models would you encounter in this scenario? (Choose two.)
A. direct revenue model
B. cost center
C. profit center
D. investment center
Answer: BC
53 / 53
Download