Professional Documents
Culture Documents
JNCDA - Practice 2
JNCDA - Practice 2
By : Ipeph
interviews
questionnaires
6. Which design boundary is caused by the customer's existing physical environment?
Correct
Current infrastructure lacks the media to interconnect buildings with each other.
7. What are two popular WAN service offerings that you would use in your design? (Choose two.)
Correct
MPLS/VPN
SONET/SDH
8. You must provide role-based access to a particular network resource. Which equipment would you
use to accomplish this task?
Correct
Internal
network firewall
9. In a network design using the traditional tiered structure, which two tiers connect to untrusted
domains? (Choose two.)
Correct
WAN edge
access
10. Which sub-phase of the plan methodology must you do first?
Correct
Access
11. Which two items must be included in an RFP include? (Choose two.)
Correct
Modular requirements
Connectivity and throughput requirements
13. The business requirements RFP element contains which two items? (Choose two.)
Correct
interviews
questionnaires
job aids
16. What are two aspects of brownfield projects? (Choose two.)
Correct
Internal
17. A customer has determined the need to upgrade the network so that the packaging and shipping
facilities can meet current demand. The customer has voiced concerns that the network design and
implementation cannot affect current sales in any way. What are two ways to address this concern
in your network design? (Choose two.)
Correct
business continuity
20. You are asked to document the existing network and security infrastructure before a design update
project begins. Which three actions would be appropriate as part of your documentation project?
(Choose three.)
Correct
Internal
You should test the plan hypothetically on paper.
You should test the plan in full-fledged live exercises.
24. Which two statements are true in regards to the solution overview section of an RFP? (Choose two.)
Correct
Relevant supporting information outlining why the customer should choose your plan.
28. What should be the second item in your network design checklist?
Correct
reliability
performance
30. You are planning a data center deployment of Juniper Networks switches interconnected into a
Virtual Chassis Fabric at 40 Gbps. Which three choices are available to interconnect the switches
within the 23 feet (7 meters) distance limitation imposed by the data center? (Choose three.)
Correct
Internal
32. What is the cost-effective cable solution to connect a building access switch to a building
distribution switch at a distance of 400 feet (120 meters)?
Correct
multimode fiber
33. You are asked to develop a high-level design to meet a customer's requirement to transition an
aging switched infrastructure to a newer approach, meeting their needs for the next five years. In
your presentation to the IT department, which three areas are important to define? (Choose three.)
Correct
EX Series
QFX Series
35. What are two valid reasons to enable route summarization? (Choose two.)
Correct
security zone
IP address
application port
37. You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Correct
Internal
when redundant power sources are present on site
when a two-device HA solution is not possible
40. Which two statements are true regarding chassis clustering? (Choose two.)
Correct
The chassis cluster must contain two identical SRX Series devices.
The chassis cluster uses a control link between the two nodes.
41. Click the Exhibit button. Referring to the exhibit, which two statements are Correct in regards to
VRRP? (Choose two.)
Correct
You should use VRRP on the SRX devices for users in Group-B.
You should use VRRP on the SRX devices for users in Group-C.
42. Click the Exhibit button. Referring to the exhibit, which two statements are Correct in regards to
VRRP? (Choose two.)
Correct
hub-and-spoke
45. A company asks you to develop a solution to provide secure access to the corporate network with a
goal of providing a differentiated security policy per role and per device. Which three measurements
do you need to satisfy the company's requirement? (Choose three.)
Correct
data repositories/distribution
Internal
high availability considerations
data center interconnects
47. You want to view logs and generate basic usage reports from network devices. Which three tools
would you use to satisfy the requirements? (Choose three.)
Correct
on-box logging
Junos Space Log Director
third-party log management
48. Network Director is an example of which type of network management application?
Correct
centralized
49. You are asked to deploy VPNs in your network. What are two deployment models you would use?
(Choose two.)
Correct
site to site
hub and spoke
50. You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the
ability to have direct adjacencies between your remote sites. Which two solutions would meet these
requirements? (Choose two.)
Correct
ADVPN
Internal
54. You must design a network requires a VPN technology that employs low application latency
between spoke devices. The customer has also stated that they do not wish to use PKI certificates as
a form of authentication. Which VPN technology should you recommend in this situation?
Correct
Security Director
56. What are two advantages of using an out-of-band (OOB) management network?
Correct
An OOB management network can function with lower bandwidth requirements than in-band
management network.
An OOB management network is more reliable than in-band management network.
57. Your customer has deployed Juniper devices and network devices from other vendors in their
network. They would like you to propose a data correlation and logging solution that will work with
Juniper devices, as well as the network devices from the other vendors in their network. Which
solution would you propose in this situation?
Correct
VPLS
VXLAN
MACsec
59. What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
Correct
spine-and-leaf
Internal
61. Your customers new data center contains network devices from multiple vendors. You have been
asked to propose two technologies that will work among all the vendors' networking equipment.
Which two technologies can you recommend for the design? (Choose two.)
Correct
MACsec
VXLAN
62. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct
IGMPv2
PIM
63. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct
RSTP
LLDP
64. Your customers new network contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which
two technologies can you recommend for the design? (Choose two.)
Correct
IGMPv3
MSTP
65. Which data-interchange format is used to automate JUNOS?
Correct
YAML
Internal