JNCDA - Practice 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

JNCDA – Design – Practice 1

By : Ipeph

1. Which two statements are Correct in regard to creating a successful network design for a customer?
(Choose two.)
Correct
You should understand the state of the customer's current network.
You should analyze current and future network behavior.

2. What are the three phases of the Juniper lifecycle service approach? (Choose three.)
Correct
Plan
Operate
Build

3. What are the two main sub-phases of the plan methodology? (Choose two.)
Correct
Access
Design

4. Which two items are key RFP elements? (Choose two.)


Correct
Environmental requirements
Business requirements

5. The business continuity RFP element contains which two requirements? (Choose two.)
Correct
Network efficiency requirements
QoS requirements

6. The environmental requirements RFP element contains which two items? (Choose two.)
Correct
A detailed report that describes the facility specifications.
The number of users and workstation requirements.

7. The connectivity and throughput requirements RFP element contains which two items? (Choose
two.)
Correct
Number of wireless connections needed
Traffic analysis

8. What are two aspects of greenfield projects? (Choose two.)


Correct
New networks with few or no restraints to consider.

Internal
Next-generation networks created from the ground up.

9. When analyzing customer requirements, what are two of the categories that customer
requirements can be organized into? (Choose two.)
Correct
Security
Availability

10. When analyzing customer requirements, what are three of the categories that customer
requirements can be organized into? (Choose three.)
Correct
Performance
Scalability
Manageability

11. Which two statements are true in regards to design proposals? (Choose two.)
Correct
You should create the logical design before the physical design.
You should keep your design proposal as simple as possible.

12. Which two statements are true in regards to design proposals? (Choose two.)
Correct
Security should be considered throughout the design process.
You design proposal should be clearly documented.

13. Which two statements are Correct in regards to modularity in your network design? (Choose two.)
Correct
Modularity facilitates future growth and troubleshooting efforts.
Modularity provides hierarchical structure to your design.

14. Which two statements describe business continuity? (Choose two.)


Correct
The prevention of interruption to mission-critical services.
The ability to reestablish full functionality quickly after a disaster.

15. What are the last two steps of business continuity planning? (Choose two.)
Correct
test the plan
formulate the plan

16. Which two statements are true in regards to the Know Your Network step of business continuity
planning? (Choose two.)
Correct
You should list all the functions and services in the network.

Internal
You should perform a business impact analysis.

17. Which statements is true in regards to the Assess the Risks step of business continuity planning?
Correct
You should perform a risk assessment.

18. Which statements is true in regards to the Formulate the Plan step of business continuity planning?
Correct
You should develop a plan of action to mitigate the risks.

19. An RFP response should include which three items (Choose three.)
Correct
A solution overview
technical specifications
Executive summary

20. Which two statements describe why the executive summary section of an RFP so important?
(Choose two.)
Correct
It is an overview of Juniper's value proposition to the customer.
It is likely to be read by all decision makers.

21. Which two statements are true in regards to the technical specifications section of an RFP? (Choose
two.)
Correct
It should contain the bill of materials.
It should contain the logical and physical topology design requirements.

22. What is the second step of the Juniper recommended executive summary structure of an RFP?
Correct
Identification of business benefits.

23. What should be the first item in your network design checklist?
Correct
A process for understanding the customer's business and technical goals.

24. What should be the third item in your network design checklist?
Correct
The steps for designing a network topology.

25. What should be the fourth item in your network design checklist?
Correct
A process for selecting protocols, address schemes, naming conventions, and so forth.

Internal
26. What are two rules you should follow when writing an executive summary of an RFP? (choose two.)
Correct
Keep it short and simple.
Focus on organizational issues.

27. You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Correct
Redundant power supplies for network devices.
Virtual Chassis for EX devices.

28. You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Correct
Stateful failover for firewall platforms.
Chassis clusters for firewall platforms.

29. In which two situations does a backup WAN link with another provider make sense in a network
design? (Choose two.)
Correct
When the users in the network rely on communication through VoIP.
When the cost of a second link is less than the cost of downtime.

30. In which two situations does physical device redundancy make sense in a network design? (Choose
two.)
Correct
When downtime is not acceptable for device upgrades.
When zero impact to users and applications is required during device failures.

31. You have designed a network in which all network devices have redundant power supplies.
However, the redundant power supplies are plugged into a single power source. Which two
statements are true? (Choose two.)
Correct
The power redundancy requirements are not met as the single source of power could fail and the
network devices will not stay powered on.
The redundant power supplies should be plugged into separate power sources.

32. What are two benefits of VRRP? (Choose two.)


Correct
open standards protocol
provides redundancy through a virtual IP address

33. You are attempting to form a chassis cluster with an SRX340 and an SRX345 but the chassis cluster
formation is failing. Why is the chassis cluster failing to properly form?

Internal
Correct
The SRX model numbers must be the same to form a chassis cluster.

34. Which two statements are true regarding chassis clustering? (Choose two.)
Correct
The chassis cluster uses a fabric link between the two nodes.
The chassis cluster nodes can be located in different cities.

35. Which statement is true in regards to VRRP?


Correct
The VRRP members can contain two different routing platforms.

36. Which statement is true in regards to VRRP?


Correct
The maximum number of routing devices in a VRRP group is two.

37. Which of the two statements are true in regards to campus redundancy best practices? (Choose
two.)
Correct
You need to include hardware redundancy in your design.
You must include highly available redundant connections for all applications in your design.

38. Which of the two statements are true in regards to campus redundancy best practices? (Choose
two.)
Correct
You need to include network redundancy in your design.
You need to include redundant wireless access points in your design.

39. You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables.
What is the maximum distance between the Ethernet switches?
Correct
100 meters

40. Which two statements are true when determining the size and scope of a new network design?
(Choose two.)
Correct
The type of devices is important.
The number of users is important.

41. You have been tasked to determine the capacity and scaling of systems for a campus switching
design. Which two statements are true? (Choose two.)
Correct
The average bandwidth usage of users.
The average number of wireless devices that will be connecting to the network.

Internal
42. You must design a network for a large campus building with many users who are in different
departments. Which technology should you use for your design?
Correct
VLAN

43. You are designing a network design in which access between different groups must be tightly
restricted. What should you do to accomplish this task?
Correct
A Layer 4 firewall

44. Connectivity issues have been seen by the users in remote offices when attempting to access
resources at the corporate headquarters. You must design a fix for this issues. Which technology
should you include in your design?
Correct
redundant WAN links

45. You customer currently has a hub-and-spoke VPN but has seen that the forwarding capabilities of
the hub device being overwhelmed during times of high traffic between spoke devices. Also, due to
recent cutbacks, the IT staff is already overwhelmed. What should you recommend as a solution?
Correct
Replace the hub-and-spoke VPN with an ADVPN.

46. You customer requires a solution that allows remote home workers to access resources at the
corporate headquarters securely. Which technology would you recommend?
Correct
SSL VPN

47. Which Junos Space application can be used to manage VLANs on EX devices?
Correct
Network Director

48. Which Junos Space application can be used to store and manage events for SRX devices?
Correct
Security Director: Logging and Reporting

49. In regards to a Junos Space deployment, which two statements are true?
Correct
Junos Space typically uses the eth0 interface to manage devices through the OOB network.
Junos Space typically uses the eth3 interface to manage devices through the in-band network.

50. Junos Space Security Director is an example of which type of network management solution?
Correct
Centralized

Internal
51. Your customer wants to ensure that their data center is completely prepared for a disaster recovery
scenario. What would you recommend?
Correct
Deploying a Data Center Interconnect.

52. Which Junos Space application can be used to manage L3 VPNs on MX devices?
Correct
Connectivity Services Director

53. You customer has had troubles in the past with his STP implementations and has asked you to
design a Layer 2 network that doesn't require STP. Which technology can you recommend to the
customer?
Correct
Virtual Chassis

54. Which two statements are true regarding virtual chassis fabric (VCF)? (Choose two.)
Correct
VCF uses a spine-and-leaf architecture.
Each connected host in a data center is no more than two hops away from every other host in a data
center.

55. Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI?
(Choose two.)
Correct
GRE
EVPN

56. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct
VPLS
VRRP
57. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct
RSVP
LDP

58. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)

Internal
Correct
ISIS
LACP

59. Which data-interchange format is used to automate JUNOS?


Correct
JSON

60. Which automation tool can you use to automate Junos OS platforms?
Correct
PyEZ

61. Which two statements properly describe Junos operational scripts? (Choose two.)
Correct
A Junos operational script can be executed manually.
A Junos operational script can be executed automatically when a user logs in.

62. Which two statements properly describe Junos event policies? (Choose two.)
Correct
You can execute Junos OS operational command for the action of an event policy.
An event policy uses if-then-else logic.

63. Which two statements properly describe Junos event scripts? (Choose two.)
Correct
Junos event scripts are triggered automatically.
Junos event scripts can be used to monitor the overall status of the device.

64. Which two statements properly describe Junos commit scripts? (Choose two.)
Correct
When a candidate configuration is committed, all active commit scripts are used.
Junos commit scripts can enforce custom configuration rules.

65. Which automation tool can you use to automate Junos OS platforms?
Correct
Chef

Internal

You might also like