Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

JNCDA – Design – Practice 2

By : Ipeph

1. What describes customer business requirements?


Correct

vision of future growth


2. What would be used to understand the types of applications on the network and how often those
applications are used?
Correct

traffic flow analysis


3. Your customer has indicated that they are about to acquire another organization and integrate that
acquisition into their corporation. Which two major areas must be examined as part of the network
design? (Choose two.)
Correct

scale constraints of existing hardware


protocol incompatibilities
4. Which two reasons show the importance of understanding a user's applications when designing a
network solution? (Choose two.)
Correct

Quality of service (QoS) can be optimized for specific applications.


The network engineer can infer traffic patterns.
5. Which two elements of customer data would you use to determine the applications that your
customer uses most often? (Choose two.)
Correct

interviews
questionnaires
6. Which design boundary is caused by the customer's existing physical environment?
Correct

Current infrastructure lacks the media to interconnect buildings with each other.
7. What are two popular WAN service offerings that you would use in your design? (Choose two.)
Correct

MPLS/VPN
SONET/SDH
8. You must provide role-based access to a particular network resource. Which equipment would you
use to accomplish this task?
Correct

Internal
network firewall
9. In a network design using the traditional tiered structure, which two tiers connect to untrusted
domains? (Choose two.)
Correct

WAN edge
access
10. Which sub-phase of the plan methodology must you do first?
Correct

Access
11. Which two items must be included in an RFP include? (Choose two.)
Correct

A list of design requirements.


The types of solutions the design must provide.
12. Which two items are key RFP elements? (Choose two.)
Correct

Modular requirements
Connectivity and throughput requirements
13. The business requirements RFP element contains which two items? (Choose two.)
Correct

A summary the type of business the customer is in.


An explanation of why a new design is required.
14. The modular requirements RFP element contains which two items? (Choose two.)
Correct

Hierarchical design considerations


Functionality of each module within the design
15. Which three options are effective ways of gathering data about the customer's current networking
environment? (Choose three.)
Correct

interviews
questionnaires
job aids
16. What are two aspects of brownfield projects? (Choose two.)
Correct

Old equipment that should be replaced.


Legacy applications that are no longer used.

Internal
17. A customer has determined the need to upgrade the network so that the packaging and shipping
facilities can meet current demand. The customer has voiced concerns that the network design and
implementation cannot affect current sales in any way. What are two ways to address this concern
in your network design? (Choose two.)
Correct

Analyze packet flow.


Create continuity plans.
18. What are two ways that a user's business model is important for network design purposes? (Choose
two.)
Correct

It allows the engineer to infer certain technical requirements.


It suggests certain budgetary and scheduling constraints.
19. You are the network architect with a large banking institution with operations around the world.
Any outage results in lost revenue for your company, and may result in lost customers. Network
uptime is your top priority. What should be your focus?
Correct

business continuity
20. You are asked to document the existing network and security infrastructure before a design update
project begins. Which three actions would be appropriate as part of your documentation project?
(Choose three.)
Correct

Review the available documentation with the security administrators.


Survey all data centers and wiring closets.
Review the available documentation with the network administrators.
21. You are the network administrator for a large university, and are ready to upgrade your network.
You want to solicit multiple vendors for design suggestions to help you define your plan moving
forward. Which two methods should you employ? (Choose two.)
Correct

Attend industry conferences.


Publish an RFI to key vendors.
22. What are the first two steps of business continuity planning? (Choose two.)
Correct

know your network


assess the risks
23. Which two statements are true in regards to the Test the Plan step of business continuity planning?
(Choose two.)
Correct

Internal
You should test the plan hypothetically on paper.
You should test the plan in full-fledged live exercises.
24. Which two statements are true in regards to the solution overview section of an RFP? (Choose two.)
Correct

It should outline the technical benefits of the proposed design.


It should address the customer's goals, scope, and requirements.
25. What is the first step of the Juniper recommended executive summary structure of an RFP?
Correct

Introduction of the customer's need or problem.


26. What is the third step of the Juniper recommended executive summary structure of an RFP?
Correct

Overview of your proposed solution.


27. What is the forth step of the Juniper recommended executive summary structure of an RFP?
Correct

Relevant supporting information outlining why the customer should choose your plan.
28. What should be the second item in your network design checklist?
Correct

A validation process for analyzing customer's existing environment.


29. What are two primary characteristics of the core tier in a network design? (Choose two.)
Correct

reliability
performance
30. You are planning a data center deployment of Juniper Networks switches interconnected into a
Virtual Chassis Fabric at 40 Gbps. Which three choices are available to interconnect the switches
within the 23 feet (7 meters) distance limitation imposed by the data center? (Choose three.)
Correct

passive optical fiber


direct attach copper
active optical fiber
31. What are three environmental characteristics that affect the campus network design? (Choose
three.)
Correct

transmission media characteristics


distribution of users
locations of wiring closets

Internal
32. What is the cost-effective cable solution to connect a building access switch to a building
distribution switch at a distance of 400 feet (120 meters)?
Correct

multimode fiber
33. You are asked to develop a high-level design to meet a customer's requirement to transition an
aging switched infrastructure to a newer approach, meeting their needs for the next five years. In
your presentation to the IT department, which three areas are important to define? (Choose three.)
Correct

impact to the business from an operations perspective


business costs of not going forward
cost of the proposed solution
34. In a Virtual Chassis Fabric, which two platforms are supported? (Choose two.)
Correct

EX Series
QFX Series
35. What are two valid reasons to enable route summarization? (Choose two.)
Correct

to reduce routing overhead


to benefit from a hierarchical IP addressing plan
36. On an SRX Series device, what are three match criteria of a security policy? (Choose three.)
Correct

security zone
IP address
application port
37. You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Correct

Redundant network devices


How-swappable chassis components.
38. You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Correct

multiple physical uplinks


LAGs towards the LAN.
39. In which two situations does power supply redundancy make sense in a network design? (Choose
two.)
Correct

Internal
when redundant power sources are present on site
when a two-device HA solution is not possible
40. Which two statements are true regarding chassis clustering? (Choose two.)
Correct

The chassis cluster must contain two identical SRX Series devices.
The chassis cluster uses a control link between the two nodes.
41. Click the Exhibit button. Referring to the exhibit, which two statements are Correct in regards to
VRRP? (Choose two.)
Correct

You should use VRRP on the SRX devices for users in Group-B.
You should use VRRP on the SRX devices for users in Group-C.
42. Click the Exhibit button. Referring to the exhibit, which two statements are Correct in regards to
VRRP? (Choose two.)
Correct

You can use VRRP on the SRX devices to WAN connections.


You can use VRRP on the SRX devices for users in Group-B.
43. Click the Exhibit button. Referring to the exhibit, what should you do to increase high availability in
the network?
Correct

Connect each server to two access switches.


44. Your corporate network is located in a single, multifloor building. Several smaller, remote buildings
connect into your main corporate network. Which topology describes your network?
Correct

hub-and-spoke
45. A company asks you to develop a solution to provide secure access to the corporate network with a
goal of providing a differentiated security policy per role and per device. Which three measurements
do you need to satisfy the company's requirement? (Choose three.)
Correct

the number of guest access users


the number of unmanned IP enabled end-point systems
the number of physical desktop ports
46. You are reviewing an existing corporate network design with a plan to reduce the number of data
centers deployed by a customer. Which three considerations are relevant to this exercise? (Choose
three.)
Correct

data repositories/distribution

Internal
high availability considerations
data center interconnects
47. You want to view logs and generate basic usage reports from network devices. Which three tools
would you use to satisfy the requirements? (Choose three.)
Correct

on-box logging
Junos Space Log Director
third-party log management
48. Network Director is an example of which type of network management application?
Correct

centralized
49. You are asked to deploy VPNs in your network. What are two deployment models you would use?
(Choose two.)
Correct

site to site
hub and spoke
50. You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the
ability to have direct adjacencies between your remote sites. Which two solutions would meet these
requirements? (Choose two.)
Correct

VPLS Layer 2 VPN


IPsec tunnels over the Internet
51. Which two statements are true in regards to network capacity planning? (Choose two.)
Correct

The network management platform is not important.


The application behavior is important.
52. You are designing a network in which access between different groups must be tightly restricted.
What should you do to accomplish this task?
Correct

Use a firewall with security policies to control the traffic.


53. You need to deploy an IPsec VPN technology that provides low application latency when a remote
office is communicating with another remote office. This solution must also provide low
management overhead. Which IPsec VPN technology should you choose for this design?
Correct

ADVPN

Internal
54. You must design a network requires a VPN technology that employs low application latency
between spoke devices. The customer has also stated that they do not wish to use PKI certificates as
a form of authentication. Which VPN technology should you recommend in this situation?
Correct

full mesh VPN


55. Which Junos Space application can be used to manage the security features of the SRX devices?
Correct

Security Director
56. What are two advantages of using an out-of-band (OOB) management network?
Correct

An OOB management network can function with lower bandwidth requirements than in-band
management network.
An OOB management network is more reliable than in-band management network.
57. Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network. Which
solution would you propose in this situation?
Correct

Juniper Secure Analytics


58. You are planning to upgrade the core network infrastructure at your corporation. This upgrade will
require a number of advanced features to support your requirements. You do not want any
proprietary protocols in the new design. Which three technologies would you include in the design?
(Choose three.)
Correct

VPLS
VXLAN
MACsec
59. What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
Correct

Multiple devices are inter-connected into a single logical device.


It supports up to 40 Gbps interfaces.
60. Your customer is building a new data center and the applications require very low latency. Which
fabric architecture would you recommend?
Correct

spine-and-leaf

Internal
61. Your customers new data center contains network devices from multiple vendors. You have been
asked to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
Correct

MACsec
VXLAN
62. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct

IGMPv2
PIM
63. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct

RSTP
LLDP
64. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct

IGMPv3
MSTP
65. Which data-interchange format is used to automate JUNOS?
Correct

YAML

Internal

You might also like