Exam4 Training QUESTION & ANSWER Latest and valid Q&A Once Fail, Full Refund http://www.exam4training.com The safer , easier way to help you pass any IT exams. Exam : JN0-1103 Title : Design, Associate (JNCIADesign) Version : V8.02 1 / 53 The safer , easier way to help you pass any IT exams. 1.Which data-interchange format is used to automate JUNOS? A. YAML B. JavaScript C. Visual Basic D. Pascal Answer: A 2.Which two statements describe business continuity? (Choose two.) A. The prevention of interruption to mission-critical services. B. The ability to reestablish full functionality quickly after a disaster. C. Manually turning on a backup server after a disaster. D. Manually loading previously backed up data. Answer: AB 3.Which two statements describe why the executive summary section of an RFP so important? (Choose two.) A. It is likely to be read by all decision makers. B. It is an overview of Juniper's value proposition to the customer. C. It outlines the technical benefits of the proposed design. D. It addresses the customer's goals, scope, and requirements. Answer: AB 4.What are two advantages of using an out-of-band (OOB) management network? A. An OOB management network is more reliable than in-band management network. B. An OOB management network is less reliable than in-band management network. C. An OOB management network requires higher bandwidth requirements than in-band management network. D. An OOB management network can function with lower bandwidth requirements than in-band management network. Answer: AD 5.Which two industry standard automation platforms are used to provision Juniper data center switches? (Choose two.) A. Python B. Chef C. OpenView D. Tivoli Answer: AB 6.What should be the third item in your network design checklist? A. A validation process for analyzing customer's existing environment. B. A process for selecting protocols, address schemes, naming conventions, and so forth. C. A process for understanding the customer's business and technical goals. D. The steps for designing a network topology. 2 / 53 The safer , easier way to help you pass any IT exams. Answer: D 7.Which statement is true in regards to VRRP? A. The VRRP members use a control link between the two nodes. B. The VRRP members use an FXP0 link between the two nodes. C. The VRRP members must contain two identical routing platforms. D. The VRRP members can contain two different routing platforms. Answer: D 8.Which two statements are true in regards to the technical specifications section of an RFP? (Choose two.) A. It should contain the logical and physical topology design requirements. B. It is likely to be read by all decision makers. C. It should contain the bill of materials. D. It should address the customer's goals, scope, and requirements. Answer: AC 9.Which automation tool uses the master/minion model for changes? A. Puppet B. Chef C. SaltStack D. Ansible Answer: C 10.What are two aspects of brownfield projects? (Choose two.) A. New networks with few or no restraints to consider. B. Old equipment that should be replaced. C. Legacy applications that are no longer used. D. Next-generation networks created from the ground up. Answer: BC 11.What are three components of an RFP? (Choose three.) A. general information about the existing network environment B. a list of devices to meet the design requirements C. a list of design requirements D. a list of available IP addresses within their current IP allocation E. the types of solutions that the design must include Answer: ACE 12.Which name is used by a service provider to identify the edge device inside the central office facing the customer? A. LSR B. PE C. CE 3 / 53 The safer , easier way to help you pass any IT exams. D. P Answer: B 13.You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this scenario, which type of security design would fulfill this requirement? A. a centralized security appliance B. a container-based security deployment C. a physical security device connected to each host D. an all-in-one virtual security device in each host Answer: B 14.Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for which protocol? A. SNMP B. IPv6 C. OSPF D. STP Answer: D 15.In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.) A. WAN edge B. aggregation C. core D. access Answer: AD 16.What is the forth step of the Juniper recommended executive summary structure of an RFP? A. Identification of business benefits. B. Relevant supporting information outlining why the customer should choose your plan. C. Overview of your proposed solution. D. Introduction of the customer's need or problem. Answer: B 17.What are the three phases of the Juniper lifecycle service approach? (Choose three.) A. Operate B. Migrate C. Plan D. Build Answer: ACD 4 / 53 The safer , easier way to help you pass any IT exams. 18.Which solution ensures data security in this environment? A. Use PNAC on all inter-switch connections. B. Use LLDP on all inter-switch connections. C. Use LACP on all inter-switch connections. D. Use MACsec on all inter-switch connections. Answer: A 19.Which two statements are true when determining the size and scope of a new network design? (Choose two.) A. The number of users is important. B. The number of users is not important. C. The type of devices is important. D. The type of devices is not important. Answer: AC 20.On an SRX Series device, what are three match criteria of a security policy? (Choose three.) A. MAC address B. IP address C. QoS D. security zone E. application port Answer: BDE 21.Which two statements properly describe Junos operational scripts? (Choose two.) A. A Junos operational script can only be only be called from another script. B. A Junos operational script can be executed manually. C. A Junos operational script can be executed automatically when a user logs in. D. A Junos operational script can only execute one operational command per script. Answer: BC 22.Which sub-phase of the plan methodology must you do first? A. Access B. Scope C. Design D. Build Answer: A 23.You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers. In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.) A. The total number of devices is increased. B. The overall network performance is increased. C. The number of connections between devices is decreased. 5 / 53 The safer , easier way to help you pass any IT exams. D. The number of protocols used is decreased. Answer: BC 24.What is the cost-effective cable solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters)? A. multimode fiber B. single-mode fiber C. power cable D. UTP Answer: A 25.Your corporate network is located in a single, multifloor building. Several smaller, remote buildings connect into your main corporate network. Which topology describes your network? A. data center B. full mesh C. campus D. hub-and-spoke Answer: D 26.What are two benefits of VRRP? (Choose two.) A. proprietary protocol B. open standards protocol C. provides redundancy through a virtual IP address D. provides redundancy through dual routing engines Answer: BC 27.Which two statements properly describe Junos event policies? (Choose two.) A. An event policy uses if-then-else logic. B. An event policy uses for-loop logic. C. You can execute Junos OS operational command for the action of an event policy. D. You cannot execute Junos OS operational command for the action of an event policy. Answer: AC 28.Which two statements are true regarding greenfield projects? (Choose two.) A. The amount of floor space and cooling are not defined as part of a greenfield project. B. In greenfield projects, the existing floor space and cooling may need to be considered. C. Greenfield projects are typically new networks with few or no restraints to consider. D. Greenfield projects typically consist of existing network components with extensive integration required. Answer: AC 29.Which type of platform would be used to correlate data and logs from many different network and security appliances? 6 / 53 The safer , easier way to help you pass any IT exams. A. Juniper Secure Analytics B. MX Series routers C. Pulse Secure D. QFabric Answer: A 30.Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution. Which two statements describe how you would meet the business managers’ objectives? (Choose two.) A. Ensure that the solution is easy to manage for the IT staff. B. Ensure that the solution is cost effective. C. Ensure that the solution is easy to use for the end user. D. Ensure that the solution provides a high quality experience for the user. Answer: CD 31.Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) A. You need to include network redundancy in your design. B. You need to include redundant wireless access points in your design. C. Hardware redundancy is not necessary for the wireless clients in your design. D. Redundant WAN connections are unnecessary in your design. Answer: AB 32.Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors. Which two factors are important from an application-driven network impact perspective? (Choose two.) A. presence of elephant flows B. IGP protocols in use C. use of HTTPS protocols by the application D. short timers Answer: AD 33.You customer has had troubles in the past with his STP implementations and has asked you to design a Layer 2 network that doesn't require STP. Which technology can you recommend to the customer? A. Virtual Chassis B. VSTP C. VLANs D. IPsec Answer: A 34.What is the first step of the Juniper recommended executive summary structure of an RFP? A. Identification of business benefits. B. Relevant supporting information outlining why the customer should choose your plan. 7 / 53 The safer , easier way to help you pass any IT exams. C. Overview of your proposed solution. D. Introduction of the customer's need or problem. Answer: D 35.You are designing a solution to allow secure communication over the public Internet for a corporate WAN deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate headquarters. Which solution will work in this scenario? A. fill mesh IPsec VPN B. hub-and-spoke GRE VPN C. Layer 3 VPN D. hub-and-spoke IPsec VPN Answer: D 36.Which three characteristics are associated with the Physical Layer of the OSI reference model? (Choose three.) A. cables B. routing protocols C. electricity D. full duplex communications E. TCP/IP Answer: ACD 37.Click the Exhibit button. Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task? A. Use VRRP on Agg-1 and Agg-2. B. Place Agg-1 and Agg-2 in a Virtual Chassis. C. Use RSTP on all devices. D. Use BGP load balancing on all devices. 8 / 53 The safer , easier way to help you pass any IT exams. Answer: B 38.Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes? A. stub B. totally stubby C. backbone D. NSSA Answer: D 39.You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave the local network. Which Juniper Networks product will accomplish this task? A. UTM B. Sky ATP C. JATP D. SDSN Answer: B 40.Which two statements are true about a service-centric data center model? (Choose two.) A. A service-centric data center model pools compute resources. B. A service-centric data center model pools storage resources. C. A service-centric data center model does not pool storage resources. D. A service-centric data center model does not pool compute resources. Answer: AB 41.Which statement describes a data center is right? A. The data center locally hosts thousands of users with wired connections, all with three to four active devices. B. The data center typically involves high density topologies with multiple points of access. C. The data center encompasses a broad area that is used to interconnect business locations and resources. D. The data center houses the computing resources and services used by a company. Answer: D 42.What are the first two steps of business continuity planning? (Choose two.) A. know your network B. test the plan C. formulate the plan D. assess the risks Answer: AD 43.What are two main elements of a network design RFP? (Choose two.) A. business requirements 9 / 53 The safer , easier way to help you pass any IT exams. B. staffing requirements C. e-waste requirements D. environmental requirements Answer: AD 44.You are designing a network design in which access between different groups must be tightly restricted. What should you do to accomplish this task? A. A Layer 7 IDP B. A Layer 3 switch C. A Layer 4 firewall D. A Layer 2 switch Answer: C 45.Your customer wants to ensure that their data center is completely prepared for a disaster recovery scenario. What would you recommend? A. Deploying a Data Center Interconnect. B. Deploying centralized management. C. Deploying decentralized management. D. Deploying dual uplinks to separate ISPs. Answer: A 46.What are three advantages of out-of-band (OoB) management over in-band management? (Choose three.) A. OoB allows the use of Telnet as a management protocol. B. OoB provides increased network security. C. OoB is more cost-effective when purchasing equipment. D. OoB provides more reliable management access. E. OoB frees up network bandwidth on campus switches. Answer: BDE 47.Which two statements are correct in regards to creating a successful network design for a customer? (Choose two.) A. You should understand the state of the customer's current network. B. You should analyze current and future network behavior. C. You should only consider greenfield network designs. D. You should only consider brownfield network designs. Answer: AB 48.You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. Which two solutions would meet these requirements? (Choose two.) A. IPsec tunnels over the Internet 10 / 53 The safer , easier way to help you pass any IT exams. B. GRE tunnels over the Internet C. MPLS Layer 3 VPN D. VPLS Layer 2 VPN Answer: AD 49.What is the maximum number of chassis supported in an SRX Series chassis cluster? A. ten B. twenty C. four D. two Answer: D 50.What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN deployment? A. Internet gateway B. MACsec C. power redundancy D. DHCP Answer: A 51.Exhibit: Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.) A. You should use VRRP on the SRX devices to WAN connections. B. You should use VRRP on the SRX devices for users in Group-A. C. You should use VRRP on the SRX devices for users in Group-B. D. You should use VRRP on the SRX devices for users in Group-C. Answer: CD 11 / 53 The safer , easier way to help you pass any IT exams. 52.Which three questions should be asked when performing a business impact analysis? (Choose three.) A. What is the cost of both partial and full outages? B. What is the replacement cost of the core switches? C. Which functions and services are critical to the company’s survival? D. How many redundant data paths are there? E. How long could an outage be sustained? Answer: ACE 53.You want to stretch Layer 2 traffic between two data centers. Which three open standards protocols would be used for this task? (Choose three.) A. EVPN B. OTV C. VPLS D. FabricPath E. GRE Answer: ACE 54.Which two applications suggest that the network should be engineered to support QoS/CoS functionality? (Choose two.) A. video conferences B. e-mail C. voice over IP (VoIP) D. customer relationship management (CRM) Answer: AC 55.Which data-interchange format is used to automate JUNOS? A. JSON B. Fortran C. C++ D. Java Answer: A 56.Your customer frequently hosts visitors who are not employees of the organization. The visitors typically request Internet access but do not require access to corporate resources. Network security is the customer’s primary concern. Which solution should you include in your design proposal? A. SSL B. NAC C. QoS D. BYOD Answer: B 12 / 53 The safer , easier way to help you pass any IT exams. 57.The connectivity and throughput requirements RFP element contains which two items? (Choose two.) A. Hierarchical design considerations B. Number of wireless connections needed C. Traffic analysis D. Functionality of each module within the design Answer: BC 58.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. DVMRP B. PIM C. IGMPv2 D. DTP Answer: BC 59.What is a defining characteristic of a Layer 3 network? A. A Layer 3 network segments broadcast traffic. B. A Layer 3 network forwards all traffic to a default gateway. C. A Layer 3 network forwards only multicast traffic. D. A Layer 3 network segments traffic at the presentation layer. Answer: A 60.Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.) A. You should list all the functions and services in the network. B. You should perform a business impact analysis. C. You should perform a risk assessment. D. You should develop a plan of action to mitigate the risks. Answer: AB 61.A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device. Which three measurements do you need to satisfy the company's requirement? (Choose three.) A. the number of physical desktop ports B. the number of power over Ethernet ports C. the number of guest access users D. the number of unmanned IP enabled end-point systems the number of WLAN access points Answer: ACD 62.You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants to enforce security measures on east-west traffic between virtual machines. Which solution should you recommend in this situation? 13 / 53 The safer , easier way to help you pass any IT exams. A. JATP B. Sky ATP C. Virtual Chassis D. vSRX Answer: A 63.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. VPLS B. VRRP C. VTP D. HSRP Answer: AB 64.Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.) A. VCF uses a spine-and-leaf architecture. B. VCF uses a hub-and-spoke architecture. C. Each connected host in a data center is no more than three hops away from every other host in a data center. D. Each connected host in a data center is no more than two hops away from every other host in a data center. Answer: AD 65.What are the last two steps of business continuity planning? (Choose two.) A. know your network B. test the plan C. formulate the plan D. assess the risks Answer: BC 66.Which two statements are true regarding chassis clustering? (Choose two.) A. The chassis cluster uses a control link between the two nodes. B. The chassis cluster uses an FXP0 link between the two nodes. C. The chassis cluster must contain two identical MX Series devices. D. The chassis cluster must contain two identical SRX Series devices. Answer: AD 67.You are working on a service provider network. You will provide network services to multiple companies across your network, while maintaining separation of traffic for different corporate entities. What are two high-level design alternatives that will meet your requirement? (Choose two.) A. IPsec VPN B. VRRP C. MSDP 14 / 53 The safer , easier way to help you pass any IT exams. D. MPLS Answer: AD 68.The modular requirements RFP element contains which two items? (Choose two.) A. Hierarchical design considerations B. Number of wireless connections needed C. Traffic analysis D. Functionality of each module within the design Answer: AD 69.What are two aspects of greenfield projects? (Choose two.) A. New networks with few or no restraints to consider. B. Old equipment that should be replaced. C. Legacy applications that are no longer used. D. Next-generation networks created from the ground up. Answer: AD 70.Which two groups within the IT organization will likely need training if a new type of network equipment is deployed throughout the enterprise? (Choose two.) A. application development B. systems administrators C. network engineering D. network operations Answer: CD 71.What are two requirements that every RFP response should include? (Choose two.) A. a support plan that includes details about servicing the components once operational B. a detailed competitor comparison document that indicates the proposed design is the least expensive option C. a detailed forecast of exception handling after the design has been implemented and is operational D. an implementation plan that includes a description of how the design will be implemented Answer: AD 72.Which two items must be included in an RFP include? (Choose two.) A. A list of design requirements. B. The new design of the network. C. An analysis of application behavior in the network. D. The types of solutions the design must provide. Answer: AD 73.You want to use standard cabling instead of crossover cabling in an environment without MDIX. In which two situations would this apply? (Choose two.) A. server-to-switch B. computer-to-switch 15 / 53 The safer , easier way to help you pass any IT exams. C. computer-to-computer D. switch-to-switch Answer: AB 74.Which design boundary is caused by the customer's existing physical environment? A. Marketing users are not permitted access to the company's financial servers. B. Current infrastructure lacks the media to interconnect buildings with each other. C. Key stakeholders disagree on how the funding for the project should be spent. D. HTTP traffic is expected to increase on the network by 57% over the next two years. Answer: B 75.Which two items are key RFP elements? (Choose two.) A. Physical design requirements B. Modular requirements C. Logical design requirements D. Connectivity and throughput requirements Answer: BD 76.You need to deploy an IPsec VPN technology that provides low application latency when a remote office is communicating with another remote office. This solution must also provide low management overhead. Which IPsec VPN technology should you choose for this design? A. SSL VPN B. full mesh VPN C. hub-and-spoke VPN D. ADVPN Answer: D 77.You are developing a network monitoring strategy to track network response time and availability. The monitoring strategy should be scalable to accommodate future network growth. Which two statements are true in this scenario? (Choose two.) A. Network reachability monitoring functions should be centralized to a dedicated monitoring device. B. RPM allows the monitoring of reachability, but does not allow delay or jitter monitoring. C. Network reachability monitoring functions should be delegated to each network device. D. RMON is a standardized system that is not vendor specific. Answer: AD 78.You customer requires a solution that allows remote home workers to access resources at the corporate headquarters securely. Which technology would you recommend? A. ADVPN B. hub-and-spoke VPN C. full mesh VPN D. SSL VPN 16 / 53 The safer , easier way to help you pass any IT exams. Answer: D 79.You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true? A. A network baseline identifies devices that do not have redundant components. B. A network baseline identifies traffic growth patterns across network devices. C. A network baseline identifies how many users are connected to the network. D. A network baseline identifies the type and level of traffic load on the network. Answer: D 80.You are asked to deploy VPNs in your network. What are two deployment models you would use? (Choose two.) A. site to site B. hub and spoke C. overlay D. hierarchical Answer: AB 81.Which two statements properly describe Junos event scripts? (Choose two.) A. Junos event scripts are triggered manually. B. Junos event scripts are triggered automatically. C. Junos event scripts can be used to monitor the overall status of the device. D. Junos event scripts cannot be used to monitor the overall status of the device. Answer: BC 82.An RFP response should include which three items (Choose three.) A. Executive summary B. Bill of materials C. A solution overview D. technical specifications Answer: ACD 83.A customer wants to implement an automation system that can update BGP routes without commits and can make hundreds of changes per minute. Which Junos automation tool would accomplish this task? A. REST Explorer B. JSNAPy C. JET D. event scripts Answer: C 84.Your customer has indicated that they are about to acquire another organization and integrate that acquisition into their corporation. Which two major areas must be examined as part of the network design? (Choose two.) 17 / 53 The safer , easier way to help you pass any IT exams. A. scale constraints of existing hardware B. regulatory approval of the takeover C. restructuring of staff responsibilities D. protocol incompatibilities Answer: AD 85.You are examining the customer’s IT organization and its responsibilities to determine how it will be impacted by your design. In this scenario, which three business functions are typically provided? (Choose three.) A. network architecture and design B. compute resourceprovisioning C. manufacturing D. network operations E. product marketing Answer: ABD 86.What are two reasons why you would send an RFP to multiple vendors (Choose two.) A. to eliminate vendors who cannot meet the requirements B. to warranty the process against fraud C. to satisfy international law requiring a minimum of three vendors D. to compare competing proposals Answer: AD 87.You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables. What is the maximum distance between the Ethernet switches? A. 100 feet B. 1000 feet C. 100 meters D. 1000 meters Answer: C 88.You are designing a network management strategy for a new network. The requirements for the management of network devices are shown below: - Administrator passwords must have an expiration date. - Administrators must be assigned role-specific privileges on each device. In this scenario, which statement is true? A. Local authentication must be used on each device. B. A centralized AAA system must be used for authentication. C. All devices must be configured with the same privilege levels. D. Each user must have a unique login account. Answer: B 89.Network Director is an example of which type of network management application? A. on-box 18 / 53 The safer , easier way to help you pass any IT exams. B. out-of-band C. centralized D. op script Answer: C 90.Why would you recommend Junos Space Security Director in a network design? A. It simplifies Ethernet switch deployments and provides rapid operation of campus and data center networks. B. It provides the power to quickly design, provision, and deliver MPLS and other Ethernet services. C. It helps administrators to more quickly and intuitively manage all phases of a security policy life cycle D. It provides detection, isolation, and resolution of network faults and incidents. Answer: C 91.Which statements is true in regards to the Assess the Risks step of business continuity planning? A. You should list all the functions and services in the network. B. You should perform a business impact analysis. C. You should perform a risk assessment. D. You should develop a plan of action to mitigate the risks. Answer: C 92.A customer has determined the need to upgrade the network so that the packaging and shipping facilities can meet current demand. The customer has voiced concerns that the network design and implementation cannot affect current sales in any way. What are two ways to address this concern in your network design? (Choose two.) A. Create continuity plans. B. Collect job aids. C. Define security measures. D. Analyze packet flow. Answer: AD 93.As part of your automation design, you need an off-box system that will be able to monitor telemetry information. You must then use that information to dynamically update devices as needed to ensure optimal network traffic flow. Which automation solution would accomplish this goal? A. Ruby B. SaltStack C. Chef D. Puppet Answer: D 94.When implementing a top-down design methodology, where would you begin collecting information to start the design process? A. the CEO of the corporation B. the Application Layer of the OSI model 19 / 53 The safer , easier way to help you pass any IT exams. C. the currently-owned network equipment D. the WAN edge Answer: B 95.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. ISIS B. LACP C. GLBP D. PAgP Answer: AB 96.You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) A. Virtual Chassis for EX devices. B. High bandwidth uplink. C. Redundant power supplies for network devices. D. SFP interfaces. Answer: AC 97.You must design a network for a large campus building with many users who are in different departments. Which technology should you use for your design? A. VLAN B. GRE C. BGP D. RIP Answer: A 98.You are working with a customer who specializes in selling custom toy boxes in more than 50 stores. The customer’s financial information must be kept secure. Which security standard should you include in your design proposal? A. user-based firewall B. NAC C. BYOD D. PCI compliance Answer: D 99.What are three components used to enforce 802.1X in your design? (Choose three.) A. authenticator B. VoIP phone C. authentication server D. supplicant 20 / 53 The safer , easier way to help you pass any IT exams. E. edge router Answer: ACD 100.When discussing network reliability, what does the term “five nines” mean? A. The network is up 99.999% of the time. B. The network is up .99999% of the time. C. The network is up 9.9999% of the time. D. The network is up .09999% of the time. Answer: A 101.What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.) A. plan B. build C. buy D. oversee Answer: AB 102.Which Junos Space application can be used to manage L3 VPNs on MX devices? A. Security Director B. Log Director C. Network Director D. Connectivity Services Director Answer: D 103.What are two phases of assessment when designing network security? (Choose two.) A. to layout a logical design B. to layout a physical design C. to identify requirements D. to perform data analysis Answer: AC 104.Which two reasons show the importance of understanding a user's applications when designing a network solution? (Choose two.) A. The network engineer can infer traffic patterns. B. Network management can be optimized for specific applications. C. Quality of service (QoS) can be optimized for specific applications. D. Network virtualization might not support all real-time applications. Answer: AC 105.What should be the fourth item in your network design checklist? A. A validation process for analyzing customer's existing environment. B. A process for selecting protocols, address schemes, naming conventions, and so forth. C. A process for understanding the customer's business and technical goals. D. The steps for designing a network topology. 21 / 53 The safer , easier way to help you pass any IT exams. Answer: B 106.Your campus network is rolling out a BYOD policy. Your design must ensure that guest users are restricted from accessing internal network resources. Which two actions would solve this problem? (Choose two.) A. Guest users should be placed in an isolated guest routing instance. B. Guest users should be placed in an isolated guest VLAN. C. Guest users should be placed in a non-isolated guest routing instance. D. Guest users should be placed in a non-isolated guest VLAN. Answer: AB 107.VLANs provide separation of which type of domain? A. collision domains B. multicast domains C. broadcast domains D. routing domains Answer: C 108.Which popular data center architecture provides improved availability between two switching nodes? A. MPLS traffic engineering B. multichassis link aggregation C. 802.1br D. fabric Clos architecture Answer: D 109.In which two situations does physical device redundancy make sense in a network design? (Choose two.) A. When zero impact to users and applications is required during device failures. B. When device failures in the customer's WAN provider are a possibility. C. When downtime is not acceptable for device upgrades. D. When server load in the DMZ is a is higher than normal. Answer: AC 110.You are asked to provide a network design for a project which spans the needs of multiple organizational entities. Which key contact will you need to help define success for this activity? A. the project manager overseeing all network development activities B. the accounting standards department head C. the human resources staff manager D. the CFO responsible for strategic business development Answer: A 111.Which automation tool can you use to automate Junos OS platforms? A. PyEZ 22 / 53 The safer , easier way to help you pass any IT exams. B. C# C. PHP D. SQL Answer: A 112.You have designed a network in which all network devices have redundant power supplies. However, the redundant power supplies are plugged into a single power source. Which two statements are true? (Choose two.) A. There is no problem and the power redundancy requirements are met. B. The power redundancy requirements are not met as the single source of power could fail and the network devices will not stay powered on. C. The redundant power supplies should be plugged into separate power sources. D. Redundant power supplies should always be plugged into the same power source. Answer: BC 113.A local university has decided to expand their research capabilities and build a new research facility. You have been hired to design and install the new network in this building. The research team expects to generate massive amounts of data, which must be shared with other facilities located on the same campus. Physical access to the building is restricted, and the connection to the other buildings is private and direct. What is your primary concern in the design of the network? A. resiliency B. security C. encryption D. scalability Answer: B 114.When analyzing customer requirements, what are two of the categories that customer requirements can be organized into? (Choose two.) A. Core B. Access C. Security D. Availability Answer: CD 115.What are two valid reasons to implement a network management solution within your network infrastructure? (Choose two.) A. to increase network visibility B. to eliminate the need for network planning C. to reduce network operating expenditures D. to reduce network capital expenditures Answer: AC 116.What are two important considerations with respect to the customer's IT organization which might 23 / 53 The safer , easier way to help you pass any IT exams. affect your design? (Choose two.) A. availability of funding to increase IT staffing B. staff expertise levels in the technology under consideration C. reporting hierarchy of the IT support organization D. availability of the IT telephone contact center Answer: AB 117.You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. In this scenario, which VPN technology would be used to accomplish this task? A. IPsec VPN B. Layer 3 VPN C. GRE D. EVPN Answer: D 118.What is an example of a port-based network access control protocol? A. 802.1q B. 802.1x C. 802.3x D. 802.1r Answer: B 119.The business continuity RFP element contains which two requirements? (Choose two.) A. Wired connection requirements B. Traffic requirements C. Network efficiency requirements D. QoS requirements Answer: CD 120.Which two statements properly describe Junos commit scripts? (Choose two.) A. Junos commit scripts can enforce custom configuration rules. B. Junos commit scripts cannot enforce custom configuration rules. C. When a candidate configuration is committed, only the first active commit script is used. D. When a candidate configuration is committed, all active commit scripts are used. Answer: AD 121.A regional retail store has requested a WAN upgrade proposal. You have been collecting their requirements. Which three inputs would be included in your proposal? (Choose three.) A. in-store WiFi B. existing network environment C. level of virtualization D. number of stores 24 / 53 The safer , easier way to help you pass any IT exams. E. budget Answer: BDE 122.Which three elements would affect user data flows in a customer’s existing network? (Choose three.) A. QoS policies B. budget C. log collection D. traffic behavior E. existing applications Answer: ADE 123.What are three use cases for Data Center Interconnect? (Choose three.) A. security B. Layer 2 extension C. disaster recovery D. geoclustering E. ease of management Answer: BCE 124.Exhibit: Referring to the exhibit, which two statements are correct in regards to VRRP? (Choose two.) A. You can use VRRP on the SRX devices to WAN connections. B. You can use VRRP on the SRX devices for users in Group-A. C. You can use VRRP on the SRX devices for users in Group-B. D. You can use VRRP on the SRX devices for users in Group-C. Answer: AC 25 / 53 The safer , easier way to help you pass any IT exams. 125.Which two statements are correct in regards to modularity in your network design? (Choose two.) A. Modularity facilitates future growth and troubleshooting efforts. B. Modularity provides hierarchical structure to your design. C. Modularity provides a flat structure to your design. D. Modularity can stop future growth and troubleshooting efforts. Answer: AB 126.What should be the second item in your network design checklist? A. A validation process for analyzing customer's existing environment. B. A process for selecting protocols, address schemes, naming conventions, and so forth. C. A process for understanding the customer's business and technical goals. D. The steps for designing a network topology. Answer: A 127.In which two situations does power supply redundancy make sense in a network design? (Choose two.) A. when using an SRX320 B. when redundant power sources are not present on site C. when redundant power sources are present on site D. when a two-device HA solution is not possible Answer: CD 128.Which statement is true in regards to VRRP? A. The maximum number of routing devices in a VRRP group is two. B. The maximum number of routing devices in a VRRP group is three. C. The maximum number of routing devices in a VRRP group is four. D. The maximum number of routing devices in a VRRP group is ten. Answer: A 129.Which two statements are true in regards to the Test the Plan step of business continuity planning? (Choose two.) A. You should test the plan hypothetically on paper. B. You should test the plan in full-fledged live exercises. C. You should only test the plan if the risk-assessment shows that more than 10% of the customer's revenue is at risk. D. You should only test the plan if the risk-assessment shows that more than 20% of the customer's revenue is at risk. Answer: AB 130.You are the network architect with a large banking institution with operations around the world. Any outage results in lost revenue for your company, and may result in lost customers. Network uptime is your top priority. What should be your focus? 26 / 53 The safer , easier way to help you pass any IT exams. A. return on investment B. capacity planning C. business continuity D. service virtualization Answer: C 131.You have an access switch that must connect to an aggregation switch. The two switches are 2,600 feet (800 meters) apart. Which type of media would be used to connect the Layer 2 switches? A. multimode fiber B. single-mode fiber C. cat5 cable D. cat6E cable Answer: B 132.In a Virtual Chassis Fabric, which two platforms are supported? (Choose two.) A. EX Series B. MX Series C. SRX Series D. QFX Series Answer: AD 133.What would be used to understand the types of applications on the network and how often those applications are used? A. logical topology B. trust and untrust zones C. traffic flow analysis D. routing policies Answer: C 134.Which three critical design blocks or functional areas benefit from HA design solutions? (Choose three.) A. data center B. campus C. WAN D. home office E. collocation Answer: ABC 135.What are two valid reasons to enable route summarization? (Choose two.) A. to benefit from a hierarchical IP addressing plan B. to enable the use of more than one routing protocol C. to reduce routing overhead D. to reduce the coexistence of BGP with IGPs 27 / 53 The safer , easier way to help you pass any IT exams. Answer: AC 136.You are planning to add equipment into a data center environment. What are three physical environmental considerations? (Choose three.) A. IP addressing B. floor loading C. rack door positioning D. VLAN assignments E. hot/cold aisle deployment Answer: BCE 137.What are two characteristics of using the Virtual Chassis technology in the aggregation tier of a data center? (Choose two.) A. You can fully use all up-links from the access tier. B. It increases the control plane complexity. C. If reduces the control plane complexity. D. You cannot fully use all up-links from the access tier. Answer: AC 138.What are two main data center profile solution templates? (Choose two.) A. adaptive B. transitional C. high-performance computing D. enterprise IT Answer: CD 139.What type of device can be installed to increase a broadcast domain? A. router B. switch C. IDS D. IPS Answer: B 140.What information is included in an RFP issuance? A. design requirements B. product features C. product positioning D. COGS pricing Answer: A 141.Your corporate campus consists of a single large building with several thousand users. Functional groups are each located in a separate area of the building with their proprietary data hosted locally. Some communication occurs between the various groups and must be tightly restricted. Which technology should be used to accomplish this task? 28 / 53 The safer , easier way to help you pass any IT exams. A. intrusion prevention system B. firewall C. router D. switch Answer: B 142.Which of the two statements are true in regards to campus redundancy best practices? (Choose two.) A. You must include highly available redundant connections for all applications in your design. B. You need to include hardware redundancy in your design. C. Wire-line reliability is not necessary for the wireless clients in your design. D. Redundancy of wireless access points in unnecessary in your design. Answer: AB 143.You customer currently has a hub-and-spoke VPN but has seen that the forwarding capabilities of the hub device being overwhelmed during times of high traffic between spoke devices. Also, due to recent cutbacks, the IT staff is already overwhelmed. What should you recommend as a solution? A. Replace the hub-and-spoke VPN with a full mesh VPN. B. Replace the hub-and-spoke VPN with a SSL VPN. C. Replace the hub-and-spoke VPN with a full mesh MPLS VPN. D. Replace the hub-and-spoke VPN with an ADVPN. Answer: D 144.What are three relevant considerations for determining the appropriate amount of bandwidth for a site? (Choose three.) A. applications used at that site B. quantity of users at that site C. equipment types at that site D. available power at that site E. square footage (or meters) for that site Answer: ABC 145.What are two primary characteristics of the core tier in a network design? (Choose two.) A. performance B. inspection C. reliability D. manipulation Answer: AC 146.Your customer is engaged in healthcare service support. What are two considerations when designing their network? (Choose two.) A. number of PoE switch ports B. secure control of access to network components 29 / 53 The safer , easier way to help you pass any IT exams. C. support for time stamping of data transfers D. control of access to sensitive information Answer: BD 147.Which two mechanisms allow administrators to authenticate on a Junos OS device? (Choose two.) A. Active Directory B. TACACS+ C. LDAP D. RADIUS Answer: BD 148.What are three ways to secure a customer’s network that includes several retail stores? (Choose three.) A. Isolate sensitive data from devices that access the network using security zones. B. Ensure that the network meets PCI compliance. C. Use 802.11g to isolate sensitive data from devices that access the network. D. Secure cashier access from branch locations by requiring BYOD. E. Provide guest access on a separate VLAN protected by NAC. Answer: ABE 149.You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) A. How-swappable chassis components. B. Redundant ACLs. C. Redundant network devices D. Copper interfaces. Answer: AC 150.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. LLDP B. PVST+ C. IGRP D. RSTP Answer: AD 151.Which two statements are true about separating production and management networks? (Choose two.) A. Separation simplifies data collection. B. Separation complicates data collection. C. Separation increases bandwidth contention. D. Separation eliminates bandwidth contention. Answer: BD 30 / 53 The safer , easier way to help you pass any IT exams. 152.You are working on a campus design for a customer who has acquired a building across the street from the main facility. The recently acquired building was built in 1979 and has not been updated to support the demands of current network technologies. The building must support high-speed network connections for all users working at the location. Which two elements would you consider when analyzing connectivity and throughput requirements for this new location? (Choose two.) A. the hierarchical modules used within each group at the new location B. the data received from a traffic analysis C. the condition of the physical media at the new location D. the type of business the customer is in Answer: BC 153.You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. For which purpose would you collect this information? A. risk assessment B. redundancy C. high availability D. disaster recovery Answer: A 154.Which two statements are true regarding a Virtual Chassis? (Choose two.) A. A Virtual Chassis must be configured on the same series but not the same model. B. A Virtual Chassis supports up to 10 participating devices. C. A Virtual Chassis supports only two participating devices D. A Virtual Chassis can be configured on mixed series and models. Answer: BD 155.You are asked to provide a design proposal for a data center environment. As part of your solution, you are asked to simplify the management of the ToR EX Series switches. In this scenario, which solution will accomplish this requirement? A. Clos fabric B. MC-LAG C. Virtual Chassis D. VRRP Answer: C 156.You are planning a data center deployment of Juniper Networks switches interconnected into a Virtual Chassis Fabric at 40 Gbps. Which three choices are available to interconnect the switches within the 23 feet (7 meters) distance limitation imposed by the data center? (Choose three.) 31 / 53 The safer , easier way to help you pass any IT exams. A. direct attach copper B. active optical fiber C. passive optical fiber D. SFP E. cat6E Answer: ABC 157.Junos Space Security Director is an example of which type of network management solution? A. on-box B. op script C. event script D. centralized Answer: D 158.You are consulting on the redesign for a large retail network. The customer has dozens of locations, all connected to a central data center. Which two requirements would you expect from you customer? (Choose two.) A. resiliency to ensure continuous operation B. WAN aggregation using Internet-based VPN C. very high throughput at every location D. distributed network management Answer: AB 159.You are asked to examine the infrastructure requirements needed to provision a new network build in support of a customer who wants to take advantage of their service provider’s MPLS/VPN offering. Which three considerations would be relevant to this work? (Choose three.) A. supplicant roles in the current network layout B. server hypervisor and host OS selection C. backdoor connectivity requirements D. IGP protocols deployed in the customer environment E. site-to-site versus site-to-hub communications Answer: CDE 160.What would be a Juniper Networks best practice for a network management network? A. Keep the out-of-band management network as flat and simple as possible. B. Use spanning tree to prevent loops within the out-of-band management network. C. Use in-band network management. D. Have a multi-tier out-of-band management network. Answer: D 161.What are two tiers used in a traditional data center design? (Choose two.) A. core B. aggregation C. compute 32 / 53 The safer , easier way to help you pass any IT exams. D. user Answer: AB 162.What is the function of the access tier in a traditional Layer 2 network environment with dispersed VLAN connectivity requirements? A. The access tier provides network connectivity to end-user devices and other hosts, and enforces network access policy. B. The access tier interfaces with lower tier devices and provides a high-speed interconnect with the north-bound WAN edge device. C. The access tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway services for the network. D. The access tier relays packets between the lower tier Layer 2 devices and functions as the gateway to the upper tier device. Answer: A 163.What are three examples of physical security? (Choose three.) A. security cameras B. access door keypads C. a mantrap D. man in the middle E. intrusion detection and prevention Answer: ABC 164.You are the network administrator for a large university, and are ready to upgrade your network. You want to solicit multiple vendors for design suggestions to help you define your plan moving forward. Which two methods should you employ? (Choose two.) A. Publish an RFP to key vendors. B. Publish an RFI to key vendors. C. Attend industry conferences. D. Require your reseller to submit a BOM. Answer: BC 165.Which two statements are true in regards to design proposals? (Choose two.) A. You should add as much complexity as possible to your design proposal.. B. You should keep your design proposal as simple as possible. C. You should create the physical design before the physical design. D. You should create the logical design before the physical design. Answer: BD 166.You are planning to upgrade the core network infrastructure at your corporation. This upgrade will require a number of advanced features to support your requirements. You do not want any proprietary protocols in the new design. Which three technologies would you include in the design? (Choose three.) A. VPLS 33 / 53 The safer , easier way to help you pass any IT exams. B. MACsec C. FabricPath D. VXLAN E. EtherChannel Answer: ABD 167.Which two statements are true in regards to the solution overview section of an RFP? (Choose two.) A. It contains the bill of materials. B. It is an overview of Juniper's value proposition to the customer. C. It should outline the technical benefits of the proposed design. D. It should address the customer's goals, scope, and requirements. Answer: CD 168.Which three options are effective ways of gathering data about the customer's current networking environment? (Choose three.) A. questionnaires B. interviews C. social media D. job aids Answer: ABD 169.Your customer has deployed Juniper devices and network devices from other vendors in their network. They would like you to propose a data correlation and logging solution that will work with Juniper devices, as well as the network devices from the other vendors in their network. Which solution would you propose in this situation? A. Security Director: Logging and Reporting B. Contrail Cloud C. Juniper Secure Analytics D. Connectivity Services Director Answer: C 170.What is the function of the core tier in a traditional three tier Layer 2 network environment? A. The core tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway services for the network. B. The core tier interfaces with lower tier devices and provides a high-speed interconnect with the northbound WAN edge device. C. The core tier provides network connectivity to end-user devices and other hosts and enforces network access policy. D. The core tier relays traffic between the lower tier Layer 2 devices and functions as the gateway to the upper tier device. Answer: B 171.What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.) A. Multiple devices are inter-connected into a single logical device. 34 / 53 The safer , easier way to help you pass any IT exams. B. One devices is broken up into multiple logical devices. C. It supports up to 10 Gbps interfaces. D. It supports up to 40 Gbps interfaces. Answer: AC 172.A company requires a managed WAN solution that supports Layer 2 adjacency across remote offices for applications and services. What solution should be selected? A. DMVPN B. MPLS C. VPLS D. FR Answer: C 173.The business requirements RFP element contains which two items? (Choose two.) A. A summary the type of business the customer is in. B. An explanation of why a new design is required. C. A detailed report that describes the facility specifications. D. The number of users and workstation requirements. Answer: AB 174.Your customer is a growing enterprise with limited capital to invest in network expansions. They have noticed performance problems in their campus LAN, which have been traced back to a high oversubscription ratio between the aggregation and core layers. The customer’s aggregation and core switches are connected using a single 1GbE connection. Which solution improves network performance? A. Add additional 1GbE connections between the aggregation and core layers with LACP. B. Add additional 1GbEconnections between the aggregation and core layers with MACsec. C. Add additional 1GbE connections between the aggregation and core layers with PNAC. D. Add additional 1GbE connections between the aggregation and core layers with LLDP. Answer: A 175.Connectivity issues have been seen by the users in remote offices when attempting to access resources at the corporate headquarters. You must design a fix for this issues. Which technology should you include in your design? A. hub-and-spoke VPN B. auto-discovery VPN C. redundant WAN links D. accelerated WAN links Answer: C 176.What does the network MTTR measure? A. the length of time it takes to design the network B. the length of time to build the network 35 / 53 The safer , easier way to help you pass any IT exams. C. the length of time to repair the network D. the length of time it takes to reboot the network devices Answer: C 177.Which two statements are true in regards to design proposals? (Choose two.) A. Security only needs to be considered after the network is in place and functioning. B. Security should be considered throughout the design process. C. You design proposal should be clearly documented. D. There is no need to document your design proposal. Answer: BC 178.What does the network MTBF indicate? A. the speed of the network B. the reliability of the network C. the age of the network D. the cost of the network Answer: B 179.Which statements is true in regards to the Formulate the Plan step of business continuity planning? A. You should list all the functions and services in the network. B. You should perform a business impact analysis. C. You should perform a risk assessment. D. You should develop a plan of action to mitigate the risks. Answer: D 180.Which application would be used to manage Juniper EX Series switches? A. Network Director B. Security Director C. Log Manager D. Services Activation Director Answer: A 181.You are consulting in a network architect role for a multinational corporation. As part of your contract, you have been asked to propose an update to the company’s network design. You have completed the initial design draft. Which statement describes what you should do next in your project? A. Begin to plan for a proof-of-concept demonstration to show why your design is superior to the current network. B. Schedule a time with the board of directors to present the proposed solution. C. Schedule the first phase of implementation. D. Share the design with the other network administrators and solicit feedback. Answer: D 182.Which automation tool can you use to automate Junos OS platforms? 36 / 53 The safer , easier way to help you pass any IT exams. A. HTML2.0 B. OpenView C. Chef D. Janus Answer: C 183.Your customer is a government organization with strict security requirements. They want to expand their Layer 2 infrastructure between multiple buildings within the same campus environment. They also want to ensure that no unauthorized devices are connected between the switches in the different buildings. Which solution ensures data security in this environment? A. Use PNAC on all inter-switch connections. B. Use LLDP on all inter-switch connections. C. Use LACP on all inter-switch connections. D. Use MACsec on all inter-switch connections. Answer: A 184.You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure. Which statement is true about the proposed solution? A. IPsec packets can be fragmented once encrypted. B. IPsec tunnels will require an MPLS infrastructure through the WAN. C. IPsec can require MTU modifications to accommodate the additional overhead. D. Packets that are passed through an IPsec tunnel are not encrypted. Answer: C 185.You are gathering information to determine capacity, density, and scaling of systems for a campus switching design. What information is critical to the design? (Choose three.) A. the number of users with a fixed desktop station and attached IP phone B. the number of users that are home office/mobile workers C. the number of guest users or contractors accessing with a mobile hot spot D. the number of physical VolP phones not connected to a desktop E. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS machines) Answer: ADE 186.What are two rules you should follow when writing an executive summary of an RFP? (choose two.) A. Give a history of Juniper Networks. B. Canned responses are ok to use. C. Focus on organizational issues. D. Keep it short and simple. Answer: CD 187.You have been tasked to determine the capacity and scaling of systems for a campus switching 37 / 53 The safer , easier way to help you pass any IT exams. design. Which two statements are true? (Choose two.) A. The average number of wireless devices that will be connecting to the network. B. The number of guest users. C. The number of remote workers. D. The average bandwidth usage of users. Answer: AD 188.Which two metrics are important for determining the size and scope of a new network design? (Choose two.) A. implementation time frame B. number of users C. location of users D. training requirements Answer: BC 189.What is the name of Juniper’s network management platform? A. Junos B. Junos Space C. MX Series D. Juniper Secure Analytics (JSA) Answer: B 190.In which two situations does a backup WAN link with another provider make sense in a network design? (Choose two.) A. You want to combine both WAN links in a LAG to increase throughput. B. When the users in the network rely on communication through email. C. When the users in the network rely on communication through VoIP. D. When the cost of a second link is less than the cost of downtime. Answer: CD 191.When analyzing customer requirements, what are three of the categories that customer requirements can be organized into? (Choose three.) A. Edge B. Performance C. Scalability D. Manageability Answer: BCD 192.What should be included in a network design to improve resiliency? A. climate control systems B. redundant power supplies C. out-of-band management D. in-band management 38 / 53 The safer , easier way to help you pass any IT exams. Answer: B 193.What is the function of the aggregation tier in a traditional three tier Layer 2 network environment? A. The aggregation tier interfaces with lower tier Layer devices and provides a high-speed interconnect with the north-bound WAN edge device. B. The aggregation tier relays packets between the lower tier Layer 2 devices and functions as the gateway to the upper tier Layer 2 device. C. The aggregation tier provides network connectivity to end-user devices and other hosts and enforces network access policy. D. The aggregation tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway services for the network. Answer: B 194.Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used. What should you do to accomplish this task? A. Use VRRP on Agg-1 and Agg-2. B. Place Agg-1 and Agg-2 in a Virtual Chassis C. Use RSTP on all devices. D. Use BGP load balancing on all devices. Answer: B 195.In a bring-your-own-device deployment, where would non-authenticated users be placed? A. C-VLAN B. guest VLAN C. production VLAN D. S-VLAN Answer: B 196.Your company’s network consists of your headquarters location plus several dozen remote offices. Remote office users are often unable to access data housed in the headquarters data center due to 39 / 53 The safer , easier way to help you pass any IT exams. connectivity issues. You must update the network to provide reliable access to corporate assets for remote office users. Which technology is critical to your design project? A. IPsec B. WAN acceleration C. WAN aggregation D. QoS Answer: A 197.What is the first step of business continuity planning? A. know your network B. test the plan C. assess the risk D. formulate the plan Answer: A 198.You are performing a risk assessment for a network design. Which statement is true in this scenario? A. Some risks can be safely ignored. B. The likelihood of a risk occurring should not be considered. C. A network must be designed for an uptime of five nines. D. All identified risks must have a mitigation plan in place. Answer: A 199.Which two elements of customer data would you use to determine the applications that your customer uses most often? (Choose two.) A. corporate policies B. interviews C. questionnaires D. business goals Answer: BC 200.Which solution would ensure that voice traffic is treated with a higher priority than data traffic throughout a network? A. class of service B. routing instance C. 802.1Q VLAN tags D. link aggregation Answer: A 201.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. VTP 40 / 53 The safer , easier way to help you pass any IT exams. B. MSTP C. IGMPv3 D. CGMP Answer: BC 202.SRX Series devices support which type of HA feature? A. logical systems B. HSRP C. chassis clustering D. Virtual Chassis Answer: C 203.Your corporate campus consists of a single large building with several thousand users. Employees are located randomly throughout the building. Accounting employees are mixed in with engineers and sales. You want to separate users into functional groups. Which technology should be used to accomplish this task? A. VLAN B. MPLS C. OSPF D. IPsec Answer: A 204.You are asked to propose a security solution that integrates with OpenStack, Kubernetes, and OpenShift. Which Juniper Networks product will work in this scenario? A. Sky ATP B. SDSN C. Contrail Security D. JSA Answer: C 205.Which two features would cause latency in a WAN connection? (Choose two.) A. IPS B. syslog C. telemetry D. UTM antivirus Answer: AD 206.Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API? A. REST Explore B. JSNAPy C. JET D. PyEZ 41 / 53 The safer , easier way to help you pass any IT exams. Answer: D 207.Your customer has deployed Juniper devices and network devices from other vendors in their network. They would like you to propose a data correlation and logging solution that will work with Juniper devices, as well as the network devices from the other vendors in their network. Which solution would you propose in this situation? A. Security Director: Logging and Reporting B. Contrail Cloud C. Juniper Secure Analytics D. Connectivity Services Director Answer: C 208.Your customers new data center contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. MACsec B. CDP C. VXLAN D. EIGRP Answer: AC 209.You are asked to secure a branch location in your network. Which two actions would accomplish this task? (Choose two.) A. Configure an IPsec VPN back to headquarters. B. Configure MC-LAG on the branch’s edge router. C. Separate VLANs for each user group. D. Configure OSPF areas in the core. Answer: AC 210.In which network location should an external DNS server be placed? A. campus data center B. enterprise branch C. internet D. remote access Answer: C 211.Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network switches to block a threat in real time? A. Policy Enforcer B. Sky ATP C. Juniper Secure Analytics D. SRX Series device Answer: B 42 / 53 The safer , easier way to help you pass any IT exams. 212.In an SRX Series environment, what would you use to manage your network's firewall policy? A. Virtual Director B. Security Director C. Network Director D. Services Activation Director Answer: B 213.What is the maximum length recommended for a single cat6E cable? A. 328 feet (100 meters) B. 1000 feet (300 meters) C. 3280 feet (1000 meters) D. 100 feet (30 meters) Answer: A 214.Which Junos Space application can be used to manage VLANs on EX devices? A. Security Director B. Log Director C. Network Director D. Connectivity Services Director Answer: C 215.The environmental requirements RFP element contains which two items? (Choose two.) A. A summary the type of business the customer is in. B. An explanation of why a new design is required. C. A detailed report that describes the facility specifications. D. The number of users and workstation requirements. Answer: CD 216.Which Junos Space application can be used to store and manage events for SRX devices? A. Network Management Platform B. Security Director: Logging and Reporting C. Network Director D. Connectivity Services Director Answer: B 217.Which Junos Space application can be used to manage the security features of the SRX devices? A. Security Director B. Log Director C. Network Director D. Connectivity Services Director Answer: A 218.Which network model would be appropriate for a 30-story building occupied by a single enterprise? A. data center network 43 / 53 The safer , easier way to help you pass any IT exams. B. campus network C. branch office network D. service provider network Answer: B 219.What are two features used to enable high availability? (Choose two.) A. VRRP B. chassis clustering C. full duplex mode D. SNMP Answer: AB 220.Your customer is building a new data center and the applications require very low latency. Which fabric architecture would you recommend? A. hub-and-spoke B. spine-and-leaf C. three tier D. four tier Answer: B 221.You are reviewing an existing corporate network design with a plan to reduce the number of data centers deployed by a customer. Which three considerations are relevant to this exercise? (Choose three.) A. data repositories/distribution B. data center interconnects C. cable plant infrastructure D. high availability considerations E. RFC1918 addressing Answer: ABD 222.An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6? A. Anycast B. Unicast C. Broadcast D. Multicast Answer: A 223.What are the two main sub-phases of the plan methodology? (Choose two.) A. Access B. Scope C. Design D. Build Answer: AC 44 / 53 The safer , easier way to help you pass any IT exams. 224.You must provide role-based access to a particular network resource. Which equipment would you use to accomplish this task? A. core router B. server load balancer C. network firewall D. SIEM Answer: C 225.What are three considerations for network capacity planning? (Choose three.) A. number of users B. application behavior C. user locations D. network management platform E. security regulations Answer: ABC 226.Which three steps are part of business continuity planning? (Choose three.) A. Assess the risks B. Know your staff. C. Know your network. D. Understand your tools. E. Test the plan Answer: ABC 227.You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) A. bit level redundancy B. multiple physical uplinks C. LAGs towards the LAN. D. redundant REs for SRX devices. Answer: BC 228.In regards to a Junos Space deployment, which two statements are true? A. Junos Space can only communicate with devices through it's eth0 interface. B. Junos Space can only communicate with devices through it's eth3 interface. C. Junos Space typically uses the eth0 interface to manage devices through the OOB network. D. Junos Space typically uses the eth3 interface to manage devices through the in-band network. Answer: CD 229.Exhibit: 45 / 53 The safer , easier way to help you pass any IT exams. Referring to the exhibit, what should you do to increase high availability in the network? A. Increase the number of connections between the core and access switches. B. Make a connection between each access switch. C. Make a connection between each core switch. D. Connect each server to two access switches. Answer: D 230.What are two popular WAN service offerings that you would use in your design? (Choose two.) A. ARCnet B. MPLS/VPN C. token ring D. SONET/SDH Answer: BD 231.You are designing a highly resilient network, which two high availability techniques should you use? (Choose two.) A. Stateful failover for firewall platforms. B. Chassis clusters for firewall platforms. C. Stateless failover for firewall platforms. D. Redundant firewall filters for firewall platforms. Answer: AB 232.What are two guidelines when designing campus networks? (Choose two.) A. The design must account for high control plane resources. B. The design must allow for network resource availability. C. The design must protect customer resources. D. The design must allow for high bandwidth. Answer: BC 233.What are two ways that a user's business model is important for network design purposes? (Choose two.) 46 / 53 The safer , easier way to help you pass any IT exams. A. It suggests certain budgetary and scheduling constraints. B. It shows which vendors the user prefers. C. It leads to customized application development, consulting requirements, or both. D. It allows the engineer to infer certain technical requirements. Answer: AD 234.Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI? (Choose two.) A. RSTP B. GRE C. EVPN D. OSPF Answer: B 235.Which compliance standard must be taken into account when designing a network that will be handling credit card transactions? A. HIPPA B. PCI C. FIPS D. SOX Answer: B 236.Which two pieces of information should be included in an RFP response? (Choose two.) A. a list of contributing material including technical publications, training guides, and courseware used to build the proposed design B. design details including information about the devices, protocols, and technologies included in the proposed design C. configuration details including proposed devices, protocols, and technologies included in the proposed design D. a network topology including a high-level logical design as well as low-level physical design of the proposed network Answer: BD 237.You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. Which statement is true in this situation? A. The connection should be secured using IPsec. B. The WAN edge devices must support MPLS. C. The connections support Layer 2 traffic bridging D. The service provider can isolate traffic in a private MPLS instance. Answer: A 238.What is the third step of the Juniper recommended executive summary structure of an RFP? A. Identification of business benefits. 47 / 53 The safer , easier way to help you pass any IT exams. B. Relevant supporting information outlining why the customer should choose your plan. C. Overview of your proposed solution. D. Introduction of the customer's need or problem. Answer: C 239.You must design a network requires a VPN technology that employs low application latency between spoke devices. The customer has also stated that they do not wish to use PKI certificates as a form of authentication. Which VPN technology should you recommend in this situation? A. ADVPN B. hub-and-spoke VPN C. full mesh VPN D. SSL VPN Answer: C 240.Your customer has deployed Juniper devices and network devices from other vendors in their network. They would like you to propose a data correlation and logging solution that will work with Juniper devices, as well as the network devices from the other vendors in their network. Which solution would you propose in this situation? A. Security Director: Logging and Reporting B. Contrail Cloud C. Juniper Secure Analytics D. Connectivity Services Director Answer: C 241.You are asked to develop a high-level design to meet a customer's requirement to transition an aging switched infrastructure to a newer approach, meeting their needs for the next five years. In your presentation to the IT department, which three areas are important to define? (Choose three.) A. recommendations for IGP timers B. business costs of not going forward C. configuration stanza for class of service definition D. impact to the business from an operations perspective E. cost of the proposed solution Answer: BDE 242.You are asked to document the existing network and security infrastructure before a design update project begins. Which three actions would be appropriate as part of your documentation project? (Choose three.) A. Survey all data centers and wiring closets. B. Review the available documentation with the security administrators. C. Review the available documentation with the server administrators. D. Review the available documentation with the network administrators. E. Review the available documentation with the purchasing department. Answer: ABD 48 / 53 The safer , easier way to help you pass any IT exams. 243.What is the second step of the Juniper recommended executive summary structure of an RFP? A. Identification of business benefits. B. Relevant supporting information outlining why the customer should choose your plan. C. Overview of your proposed solution. D. Introduction of the customer's need or problem. Answer: A 244.What are three types of automation scripts used on a Junos device? (Choose three.) A. op scripts B. commit scripts C. boot scripts D. event scripts E. control scripts Answer: ABD 245.What describes customer business requirements? A. vision of future growth B. complexity of the existing network C. size of the facility D. functionality of each module within a design Answer: A 246.You are designing network connectivity into a mission critical site. What are three design elements required to complete this design? (Choose three.) A. diverse entrance facilities B. firewall cluster C. 802.11 wireless point-to-point D. DSL/cable modem service E. redundant Internet border routers Answer: ABE 247.You are attempting to form a chassis cluster with an SRX340 and an SRX345 but the chassis cluster formation is failing. Why is the chassis cluster failing to properly form? A. The SRX340 does not support chassis clustering. B. The SRX model numbers must be the same to form a chassis cluster. C. The SRX345 does not support chassis clustering D. The SRX Series does not support chassis clustering. Answer: B 248.A large insurance firm wants to design a network for 150 remote stores and branch offices. What are three basic design approaches for the wide area network? (Choose three.) A. fully meshed 49 / 53 The safer , easier way to help you pass any IT exams. B. peer-to-peer C. ring D. partially meshed E. hub-and-spoke Answer: ADE 249.Which component triggers the quarantine of an infected endpoint? A. ALG B. firewall C. Policy Enforcer D. switch Answer: C 250.Which two statements are true regarding chassis clustering? (Choose two.) A. The chassis cluster uses a fabric link between the two nodes. B. The chassis cluster uses an FXP10 link between the two nodes. C. The chassis cluster nodes must be within 10 feet of each other. D. The chassis cluster nodes can be located in different cities. Answer: AD 251.What are three industry best practices for configuration management? (Choose three.) A. Define a consistent device naming convention. B. Use a central logging server. C. Use the rollback feature frequently. D. Back up all of the configurations frequently. E. Use descriptive fields in device configurations. Answer: ADE 252.A hospital has issued an RFP for a full network refresh. The RFP focuses on the users, applications, and bandwidth. Which two realistic assumptions would be inferred about this network? (Choose two.) A. Regulatory requirements must be considered. B. Network downtime will not be tolerated. C. WiFi services must support video. D. Quality of service (QoS) is not necessary. Answer: AB 253.In your network design, you must ensure that all user sessions passing through an SRX Series device remain active if there is a device failure. Which mechanism will accomplish this design requirement? A. chassis clustering B. MC-LAG C. Virtual Chassis D. VRRP 50 / 53 The safer , easier way to help you pass any IT exams. Answer: A 254.Which device plays the role of authenticator in an 802.1X design as shown in the exhibit? A. Device C B. Device A C. Device D D. Device B Answer: A 255.Your customers new network contains network devices from multiple vendors. You have been asked to propose two technologies that will work among all the vendors' networking equipment. Which two technologies can you recommend for the design? (Choose two.) A. RSVP B. EIGRP C. PVST D. LDP Answer: AD 256.Which two statements are true in regards to network capacity planning? (Choose two.) A. The application behavior is important. B. The application behavior is not important. C. The network management platform is not important. D. The network management platform is important. Answer: AC 257.You are designing a network in which access between different groups must be tightly restricted. What should you do to accomplish this task? A. Use a firewall with security policies to control the traffic. B. Use a switch with Layer 2 ACLs to control the traffic. C. User a router with Layer 3 ACLs to control the traffic. 51 / 53 The safer , easier way to help you pass any IT exams. D. Use a Web filtering device to control Layer 7 traffic. Answer: A 258.Which statement describes brownfield deployments? A. Brownfield deployments allow for more modular and scalable design than greenfield deployments. B. Brownfield deployments are commonly used and can be restrictive. C. Brownfield deployments are considered more expensive than greenfield deployments. D. Brownfield deployments use all new equipment. Answer: B 259.You want to view logs and generate basic usage reports from network devices. Which three tools would you use to satisfy the requirements? (Choose three.) A. local logging on your PC B. on-box logging C. Junos Space Log Director D. third-party log management E. big data solutions using Hadoop Answer: BCD 260.What should be the first item in your network design checklist? A. A validation process for analyzing customer's existing environment. B. A process for selecting protocols, address schemes, and naming conventions. C. A process for understanding the customer's business and technical goals. D. The steps for designing a network topology. Answer: C 261.Which two data center network architectures might be proposed by other vendors to compete with Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.) A. TRILL B. FCoE C. SON ET 1 D. three-tier architecture Answer: AD 262.Your customer has deployed Juniper devices and network devices from other vendors in their network. They would like you to propose a data correlation and logging solution that will work with Juniper devices, as well as the network devices from the other vendors in their network. Which solution would you propose in this situation? A. Security Director: Logging and Reporting B. Contrail Cloud C. Juniper Secure Analytics D. Connectivity Services Director Answer: C 52 / 53 The safer , easier way to help you pass any IT exams. 263.A service provider has requested that you develop a design for a new network deployment focused on a call center customer. What are two success criteria from the stakeholder’s point of view with respect to this network deployment? (Choose two.) A. easy deployment of the solution by the service provider B. requirement for secure data transmissions C. multicast stream replication must follow MSDP path D. end user demand for low latency voice connections Answer: BD 264.You are asked to secure the routing engine of all Junos devices in your design. The design should not affect transit traffic. Which action will accomplish this task? A. Use a firewall filter on a revenue port. B. Use a firewall filter on the loopback interface. C. Use a firewall filter on the fxp0 interfaces. D. Use a firewall filter on the management interface. Answer: B 265.What are three environmental characteristics that affect the campus network design? (Choose three.) A. distribution of users B. PC operating system C. transmission media characteristics D. locations of wiring closets E. remote-site connectivity Answer: ACD 266.In reviewing the customer’s IT organization, you must determine the corporate model for IT funding. Which two models would you encounter in this scenario? (Choose two.) A. direct revenue model B. cost center C. profit center D. investment center Answer: BC 53 / 53