JN0 1100
JN0 1100
Your company’s network consists of your headquarters location plus several dozen remote offices.
Remote office users are often unable to access data housed in the headquarters data center due
to connectivity issues. You must update the network to provide reliable access to corporate assets
for remote office users.
A. IPsec
B. WAN acceleration
C. WAN aggregation
D. QoS
Answer: A
Explanation:
QUESTION NO: 2
What is a feature provided by devices in the WAN aggregation site of a large enterprise WAN
deployment?
A. Internet gateway
B. MACsec
C. power redundancy
D. DHCP
Answer: A
Explanation:
QUESTION NO: 3
Which two groups within the IT organization will likely need training if a new type of network
equipment is deployed throughout the enterprise? (Choose two.)
A. application development
B. systems administrators
C. network engineering
D. network operations
QUESTION NO: 4
You want to use standard cabling instead of crossover cabling in an environment without MDIX.
A. server-to-switch
B. computer-to-switch
C. computer-to-computer
D. switch-to-switch
Answer: A,B
Explanation:
QUESTION NO: 5
What are three use cases for Data Center Interconnect? (Choose three.)
A. security
B. Layer 2 extension
C. disaster recovery
D. geoclustering
E. ease of management
Answer: B,C,E
Explanation:
QUESTION NO: 6
Your customer is a government organization with strict security requirements. They want to
expand their Layer 2 infrastructure between multiple buildings within the same campus
environment. They also want to ensure that no unauthorized devices are connected between the
switches in the different buildings.
Answer: A
Explanation:
QUESTION NO: 7
What are two tiers used in a traditional data center design? (Choose two.)
A. core
B. aggregation
C. compute
D. user
Answer: A,B
Explanation:
QUESTION NO: 8
Answer: A
Explanation:
QUESTION NO: 9
Answer: C
Explanation:
QUESTION NO: 10
Which popular data center architecture provides improved availability between two switching
nodes?
Answer: D
Explanation:
QUESTION NO: 11
What are two features used to enable high availability? (Choose two.)
A. VRRP
B. chassis clustering
C. full duplex mode
D. SNMP
Answer: A,B
Explanation:
QUESTION NO: 12
Which three open standards protocols would be used for this task? (Choose three.)
Answer: A,C,E
Explanation:
QUESTION NO: 13
What are three ways to secure a customer’s network that includes several retail stores? (Choose
three.)
A. Isolate sensitive data from devices that access the network using security zones.
B. Ensure that the network meets PCI compliance.
C. Use 802.11g to isolate sensitive data from devices that access the network.
D. Secure cashier access from branch locations by requiring BYOD.
E. Provide guest access on a separate VLAN protected by NAC.
Answer: A,B,E
Explanation:
QUESTION NO: 14
Your customer is a growing enterprise with limited capital to invest in network expansions. They
have noticed performance problems in their campus LAN, which have been traced back to a high
oversubscription ratio between the aggregation and core layers. The customer’s aggregation and
core switches are connected using a single 1GbE connection.
A. Add additional 1GbE connections between the aggregation and core layers with LACP.
B. Add additional 1GbEconnections between the aggregation and core layers with MACsec.
C. Add additional 1GbE connections between the aggregation and core layers with PNAC.
D. Add additional 1GbE connections between the aggregation and core layers with LLDP.
Answer: A
Explanation:
QUESTION NO: 15
Your customer frequently hosts visitors who are not employees of the organization. The visitors
typically request Internet access but do not require access to corporate resources. Network
security is the customer’s primary concern.
A. SSL
B. NAC
C. QoS
D. BYOD
Answer: B
Explanation:
QUESTION NO: 16
A. C-VLAN
B. guest VLAN
C. production VLAN
D. S-VLAN
Answer: B
Explanation:
QUESTION NO: 17
You have an access switch that must connect to an aggregation switch. The two switches are
2,600 feet (800 meters) apart.
A. multimode fiber
B. single-mode fiber
Answer: B
Explanation:
QUESTION NO: 18
What are three considerations for network capacity planning? (Choose three.)
A. number of users
B. application behavior
C. user locations
D. network management platform
E. security regulations
Answer: A,B,C
Explanation:
QUESTION NO: 19
You are asked to examine the infrastructure requirements needed to provision a new network
build in support of a customer who wants to take advantage of their service provider’s MPLS/VPN
offering.
Answer: C,D,E
Explanation:
QUESTION NO: 20
A. The data center locally hosts thousands of users with wired connections, all with three to four
active devices.
B. The data center typically involves high density topologies with multiple points of access.
C. The data center encompasses a broad area that is used to interconnect business locations and
resources.
D. The data center houses the computing resources and services used by a company.
Answer: D
Explanation:
QUESTION NO: 21
You are examining the customer’s IT organization and its responsibilities to determine how it will
be impacted by your design.
In this scenario, which three business functions are typically provided? (Choose three.)
Answer: A,B,D
Explanation:
QUESTION NO: 22
Your customer is deploying a new unified communications (UC) solution and business managers
want to ensure that network users adopt and use the new solution.
Which two statements describe how you would meet the business managers’ objectives? (Choose
two.)
Answer: C,D
Explanation:
QUESTION NO: 23
What is the function of the core tier in a traditional three tier Layer 2 network environment?
A. The core tier connects to theInternet and with lower tier Layer 2 devices to provide Layer 3
gateway services for the network.
B. The core tier interfaces with lower tier devices and provides a high-speed interconnect with the
north-bound WAN edge device.
C. The core tier provides network connectivity to end-user devices and other hosts and enforces
network access policy.
D. The core tier relays traffic between the lower tier Layer 2 devices and functions as the gateway
to the upper tier device.
Answer: B
Explanation:
QUESTION NO: 24
Your corporate campus consists of a single large building with several thousand users. Employees
are located randomly throughout the building. Accounting employees are mixed in with engineers
and sales. You want to separate users into functional groups.
A. VLAN
B. MPLS
C. OSPF
D. IPsec
Answer: A
Explanation:
QUESTION NO: 25
A. ten
B. twenty
C. four
D. two
Answer: D
Explanation:
QUESTION NO: 26
You are consulting on the redesign for a large retail network. The customer has dozens of
locations, all connected to a central data center.
Which two requirements would you expect from you customer? (Choose two.)
Answer: A,B
Explanation:
QUESTION NO: 27
Which two statements are true about separating production and management networks? (Choose
two.)
Answer: B,D
Explanation:
Answer: A,C
Explanation:
QUESTION NO: 29
You are working on a campus design for a customer who has acquired a building across the street
from the main facility. The recently acquired building was built in 1979 and has not been updated
to support the demands of current network technologies. The building must support high-speed
network connections for all users working at the location.
Which two elements would you consider when analyzing connectivity and throughput requirements
for this new location? (Choose two.)
A. the hierarchical modules used within each group at the new location
B. the data received from a traffic analysis
C. the condition of the physical media at the new location
D. the type of business the customer is in
Answer: B,C
Explanation:
QUESTION NO: 30
You are working on a service provider network. You will provide network services to multiple
companies across your network, while maintaining separation of traffic for different corporate
entities.
What are two high-level design alternatives that will meet your requirement? (Choose two.)
Answer: A,D
Explanation:
QUESTION NO: 31
Which network model would be appropriate for a 30-story building occupied by a single
enterprise?
Answer: B
Explanation:
QUESTION NO: 32
Which three characteristics are associated with the Physical Layer of the OSI reference model?
(Choose three.)
A. cables
B. routing protocols
C. electricity
D. full duplex communications
E. TCP/IP
Answer: A,C,D
Explanation:
QUESTION NO: 33
Answer: A
Explanation:
QUESTION NO: 34
A. 802.1q
B. 802.1x
C. 802.3x
D. 802.1r
Answer: B
Explanation:
QUESTION NO: 35
What is the function of the access tier in a traditional Layer 2 network environment with dispersed
VLAN connectivity requirements?
A. The access tier provides network connectivity to end-user devices and other hosts, and
enforces network access policy.
B. The access tier interfaces with lower tier devices and provides a high-speed interconnect with
the north-bound WAN edge device.
C. The access tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3
gateway services for the network.
D. The access tier relays packets between the lower tier Layer 2 devices and functions as the
gateway to the upper tier device.
Answer: A
Explanation:
QUESTION NO: 36
Which two realistic assumptions would be inferred about this network? (Choose two.)
Answer: A,B
Explanation:
QUESTION NO: 37
Virtual Chassis solutions for large campus networks are designed to eliminate the requirement for
which protocol?
A. SNMP
B. IPv6
C. OSPF
D. STP
Answer: D
Explanation:
QUESTION NO: 38
A large insurance firm wants to design a network for 150 remote stores and branch offices.
What are three basic design approaches for the wide area network? (Choose three.)
A. fully meshed
B. peer-to-peer
C. ring
D. partially meshed
E. hub-and-spoke
Answer: A,D,E
QUESTION NO: 39
A local university has decided to expand their research capabilities and build a new research
facility. You have been hired to design and install the new network in this building. The research
team expects to generate massive amounts of data, which must be shared with other facilities
located on the same campus. Physical access to the building is restricted, and the connection to
the other buildings is private and direct.
A. resiliency
B. security
C. encryption
D. scalability
Answer: B
Explanation:
QUESTION NO: 40
What are three design elements required to complete this design? (Choose three.)
Answer: A,B,E
Explanation:
QUESTION NO: 41
A. LSR
B. PE
C. CE
D. P
Answer: B
Explanation:
QUESTION NO: 42
You are consulting in a network architect role for a multinational corporation. As part of your
contract, you have been asked to propose an update to the company’s network design. You have
completed the initial design draft.
A. Begin to plan for a proof-of-concept demonstration to show why your design is superior to the
current network.
B. Schedule a time with the board of directors to present the proposed solution.
C. Schedule the first phase of implementation.
D. Share the design with the other network administrators and solicit feedback.
Answer: D
Explanation:
QUESTION NO: 43
A. Brownfield deployments allow for moremodular and scalable design than greenfield
deployments.
B. Brownfield deployments are commonly used and can be restrictive.
C. Brownfield deployments are considered more expensive than greenfield deployments.
D. Brownfield deployments use all new equipment.
Answer: B
Explanation:
QUESTION NO: 44
A. Junos
B. Junos Space
C. MX Series
D. Juniper Secure Analytics (JSA)
Answer: B
Explanation:
QUESTION NO: 45
Which type of platform would be used to correlate data and logs from many different network and
security appliances?
Answer: A
Explanation:
QUESTION NO: 46
What are two phases in Juniper’s lifecycle approach when designing a network? (Choose two.)
A. plan
B. build
C. buy
D. oversee
Answer: A,B
Explanation:
QUESTION NO: 47
What is the function of the aggregation tier in a traditional three tier Layer 2 network environment?
A. The aggregation tier interfaces with lower tier Layer devices and provides a high-speed
interconnect with the north-bound WAN edge device.
B. The aggregation tier relays packets between the lower tier Layer 2 devices and functions as the
gateway to the upper tier Layer 2 device.
C. The aggregation tier provides network connectivity to end-user devices and other hosts and
enforces network access policy.
D. The aggregation tier connects to the Internet and with lower tier Layer 2 devices to provide
Layer 3 gateway services for the network.
Answer: B
Explanation:
QUESTION NO: 48
Which three elements would affect user data flows in a customer’s existing network? (Choose
three.)
A. QoS policies
B. budget
C. log collection
D. traffic behavior
E. existing applications
Answer: A,D,E
Explanation:
QUESTION NO: 49
Which two mechanisms allow administrators to authenticate on a Junos OS device? (Choose two.)
A. Active Directory
B. TACACS+
C. LDAP
D. RADIUS
QUESTION NO: 50
Which two metrics are important for determining the size and scope of a new network design?
(Choose two.)
Answer: B,C
Explanation:
QUESTION NO: 51
A. design requirements
B. product features
C. product positioning
D. COGS pricing
Answer: A
Explanation:
QUESTION NO: 52
Which two applications suggest that the network should be engineered to support QoS/CoS
functionality? (Choose two.)
A. video conferences
B. e-mail
C. voice over IP (VoIP)
D. customer relationship management (CRM)
QUESTION NO: 53
What are three industry best practices for configuration management? (Choose three.)
Answer: A,D,E
Explanation:
QUESTION NO: 54
A. IP addressing
B. floor loading
C. rack door positioning
D. VLAN assignments
E. hot/cold aisle deployment
Answer: B,C,E
Explanation:
QUESTION NO: 55
What are two considerations when designing their network? (Choose two.)
Answer: B,D
Explanation:
QUESTION NO: 56
Your corporate campus consists of a single large building with several thousand users. Functional
groups are each located in a separate area of the building with their proprietary data hosted
locally. Some communication occurs between the various groups and must be tightly restricted.
Answer: B
Explanation:
QUESTION NO: 57
In reviewing the customer’s IT organization, you must determine the corporate model for IT
funding.
Which two models would you encounter in this scenario? (Choose two.)
Answer: B,C
Explanation:
Which solution would ensure that voice traffic is treated with a higher priority than data traffic
throughout a network?
A. class of service
B. routing instance
C. 802.1Q VLAN tags
D. link aggregation
Answer: A
Explanation:
QUESTION NO: 59
What are three advantages of out-of-band (OoB) management over in-band management?
(Choose three.)
Answer: B,D,E
Explanation:
QUESTION NO: 60
Which two industry standard automation platforms are used to provision Juniper data center
switches? (Choose two.)
A. Python
B. Chef
C. OpenView
D. Tivoli
Answer: A,B
Explanation:
QUESTION NO: 61
What would be a Juniper Networks best practice for a network management network?
Answer: D
Explanation:
QUESTION NO: 62
You are working with a customer who specializes in selling custom toy boxes in more than 50
stores. The customer’s financial information must be kept secure.
A. user-based firewall
B. NAC
C. BYOD
D. PCI compliance
Answer: D
Explanation:
QUESTION NO: 63
A service provider has requested that you develop a design for a new network deployment
focused on a call center customer.
What are two success criteria from the stakeholder’s point of view with respect to this network
deployment? (Choose two.)
Answer: B,D
Explanation:
QUESTION NO: 64
A regional retail store has requested a WAN upgrade proposal. You have been collecting their
requirements.
A. in-store WiFi
B. existing network environment
C. level of virtualization
D. number of stores
E. budget
Answer: B,D,E
Explanation:
QUESTION NO: 65
Your customer is experiencing problems with session drops and high response time. You are
asked to provide redesign suggestions to minimize these problems. You examine the applications
that are supported by your customer’s network to try to identify problem factors.
Which two factors are important from an application-driven network impact perspective? (Choose
two.)
Answer: A,D