0% found this document useful (0 votes)
86 views17 pages

JNCDA - Voucher Assessment

This document contains 31 multiple choice questions about network design best practices, requirements gathering, business continuity planning, and high availability techniques. The questions cover topics such as the components of a request for proposal (RFP), steps in the network design process, and ways to improve network resilience.

Uploaded by

romeo821
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views17 pages

JNCDA - Voucher Assessment

This document contains 31 multiple choice questions about network design best practices, requirements gathering, business continuity planning, and high availability techniques. The questions cover topics such as the components of a request for proposal (RFP), steps in the network design process, and ways to improve network resilience.

Uploaded by

romeo821
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Q0

Which two statements are true in regards to design proposals?

A. You should create the physical design before the physical design.

B. You should keep your design proposal as simple as possible.

C. You should create the logical design before the physical design.

D. You should add as much complexity as possible to your design proposal.

Answer: BC

Q1

Which two statements are correct in regards to modularity in your network design?

A.Modularity can stop future growth and troubleshooting efforts.

B.Modularity provides hierarchical structure to your design.

C.Modularity provides a flat structure to your design.

D. Modularity facilitates future growth and troubleshooting efforts.

Answer: BD

Q2

In an SRX Series environment, what would you use to manage your network's firewall policy?

A. Security Director

B.Network Director

C.Services Activation Director

D.Virtual Director Q4

Answer: A

Q3

Which two items must be included in an RFP include? (Choose two.)

A.A list of design requirements.

B.The new design of the network.

C.An analysis of application behavior in the network.

D.The types of solutions the design must provide.

Answer: AD
Q4

What are two aspects of brownfield projects? (Choose two.)

A.Old equipment that should be replaced.

B.Next-generation networks created from the ground up.

C.Legacy applications that are no longer used.

D.New networks with few or no restraints to consider.

Answer: AC

Q5

The connectivity and throughput requirements RFP element contains which two items? (Choose two.)

A.Hierarchical design considerations

B.Number of wireless connections needed

C.Traffic analysis

D.Functionality of each module within the design

Answer:BC

Q6

Which two statements are true in regards to design proposals?

A.Security only needs to be considered after the network is in place and functioning.

B. There is no need to document your design proposal.

C. You design proposal should be clearly documented.

D. Security should be considered throughout the design process.

Answer: CD

Q7

What are the two main sub-phases of the plan methodology? (Choose two.)

A. Scope

B. Build

C. Access

D. Design

Answer: CD

Q8
The business continuity RFP element contains which two requirements? (Choose two.)

A.Traffic requirements

B.QoS requirements

C.Network efficiency requirements

D.Wired connection requirements

Answer: BC

Q9

Your customer has indicated that they are about to acquire another organization and integrate that
acquisition into their corporation. Which two major areas must be examined as part of the network
design? (Choose two.)

A. scale constraints of existing hardware

B.protocol incompatibilities

C.restructuring of staff responsibilities

D.regulatory approval of the takeover

Answer: AB

Q10

The modular requirements RFP element contains which two items? (Choose two.)

A.Functionality of each module within the design

B.Number of wireless connections needed

C.Traffic analysis

D.Hierarchical design considerations

Answer: AD

Q11

What are two aspects of greenfield projects? (Choose two.)

A. Old equipment that should be replaced.

B. Next-generation networks created from the ground up.

C. Legacy applications that are no longer used.

D. New networks with few or no restraints to consider.

Answer: BD
Q12

When analyzing customer requirements, what are two of the categories that customer requirements can
be organized into? (Choose two.)
A.Assess

B.Core

C.Availability

D.Security

Answer: CD
Q13

You are the network administrator for a large university, and are ready to upgrade your network. You
want to solicit multiple vendors for design suggestions to help you define your plan moving forward.
Which two methods should you employ? (Choose two.)

A. Publish an RFI to key vendors.

B. Require your reseller to submit a BOM.

C. Attend industry conferences.

D. Publish an RFP to key vendors.

Answer: C,A

Q14

Which two statements are true in regards to the Test the Plan step of business continuity planning?
(Choose two.)

A. You should only test the plan if the risk-assessment shows that more than 10% of the customer's
revenue is at risk.

B. You should test the plan hypothetically on paper.

C. You should only test the plan if the risk-assessment shows that more than 20% of the customer's
revenue is at risk.

D. You should test the plan in full-fledged live exercises.

Answer: BD

Q15

What are two important considerations with respect to the customer's IT organization which might affect
your design? (Choose two.)

A. availability of funding to increase IT staffing

B. availability of the IT telephone contact center


C. reporting hierarchy of the IT support organization

D. staff expertise levels in the technology under consideration

Answer: AD

Q16

What is the second step of the Juniper recommended executive summary structure of an RFP?

A.Overview of your proposed solution.

B.Identification of business benefits.

C.Relevant supporting information outlining why the customer should choose your plan.

D.Introduction of the customer's need or problem.

Answer: B

Q17

You are asked to provide a network design for a project which spans the needs of multiple organizational
entities. Which key contact will you need to help define success for this activity?

A. the project manager overseeing all network development activities

B. the CFO responsible for strategic business development_TEXT###

C. the human resources staff manager

D. the accounting standards department head

Answer: A

Q18

Which two statements are true in regards to the technical specifications section of an RFP? (Choose
two.)

A.It is likely to be read by all decision makers.

B.It should contain the bill of materials.

C.It should address the customer's goals, scope, and requirements.

D.It should contain the logical and physical topology design requirements.

Answer: BD

Q19

What are the first two steps of business continuity planning? (Choose two.)

A. know your network

B. assess the risks


C. formulate the plan

D. test the plan

Answer: AB

Q20

a□s

What are two ways that a user's business model is important for network design purposes? (Choose
two.)

A.It leads to customized application development, consulting requirements, or both.

B.It allows the engineer to infer certain technical requirements.

C.It shows which vendors the user prefers.

D.It suggests certain budgetary and scheduling constraints.

Answer: BD

Q21

Which statements is true in regards to the Formulate the Plan step of business continuity planning?

A. You should develop a plan of action to mitigate the risks.

B. You should perform a business impact analysis.

C. You should list all the functions and services in the network.

D. You should perform a risk assessment.

Answer: A

Q22

Which two statements describe business continuity? (Choose two.)

A. The ability to reestablish full functionality quickly after a disaster.

B. Manually loading previously backed up data.

C. The prevention of interruption to mission-critical services.

D. Manually turning on a backup server after a disaster.

Answer: AC

Q23

What is the forth step of the Juniper recommended executive summary structure of an RFP?

A. Identification of business benefits.


B. Introduction of the customer's need or problem.

C. Overview of your proposed solution.

D. Relevant supporting information outlining why the customer should choose your plan.

Answer: D

Q24

Which two statements are true in regards to the solution overview section of an RFP? (Choose two.)

A. It should outline the technical benefits of the proposed design.

B. It should address the customer's goals, scope, and requirements.

C. It contains the bill of materials

D. It is an overview of Juniper's value proposition to the customer.

Answer: AB

Q25

What should be the third item in your network design checklist?

A. validation process for analyzing customer's existing environment.

B. A process for understanding the customer's business and technical goals.

C. The steps for designing a network topology.

D. process for selecting protocols, address schemes, naming conventions, and so forth.

Answer: C

Q26

In which two situations does power supply redundancy make sense in a network design? (Choose two.)

A. When a two-device HA solution is not possible.

B. When using an SRX320.

C. When redundant power sources are not present on site.

D. When redundant power sources are present on site.

Answer: AD

Q27

What are three relevant considerations for determining the appropriate amount of bandwidth for a site?
(Choose three.)

A. applications used at that site


B. equipment types at that site

C. quantity of users at that site

D. square footage (or meters) for that site

E. available power at that site

Answer: ABC

Q28

You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. Redundant power supplies for network devices.
B. High bandwidth uplink.
C. Virtual Chassis for EX devices.
D. SFP interfaces.
Answer: AC
Q29

Which two statements are true regarding chassis clustering? (Choose two.)

A.The chassis cluster uses an FXP10 link between the two nodes.

B. The chassis cluster uses a fabric link between the two nodes.

C. The chassis cluster nodes can be located in different cities.

D.The chassis cluster nodes must be within 10 feet of each other.

Answer: BC

Q30

You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables. What
the maximum distance between the Ethernet switches?

A. 1000 meters

B.1000 feet

C.100 feet

D.100 meters

Answer: D

Q31

In which two situations does physical device redundancy make sense in a network design? (Choose two.)

A. When device failures in the customer's WAN provider are a possibility.

B. When downtime is not acceptable for device upgrades.


C. When zero impact to users and applications is required during device failures.

D.When server load in the DMZ is a is higher than normal.

Answer: BC

Q32

You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)

A. LAGs towards the LAN.

B. Bit level redundancy

C. Redundant REs for SRX devices.

D. Multiple physical uplinks

Answer: AD

Q33

Which two statements are true regarding chassis clustering? (Choose two.)

A.The chassis cluster uses a control link between the two nodes.

B. The chassis cluster must contain two identical MX Series devices.

C. The chassis cluster must contain two identical SRX Series devices.

D. The chassis cluster uses an FXPO link between the two nodes.

Answer: AC

Q34

What are two valid reasons to enable route summarization? (Choose two.)

A. to reduce the coexistence of BGP with IGPs

B. to reduce routing overhead

C. to benefit from a hierarchical IP addressing plan

D. to enable the use of more than one routing protocol

Answer: BC

Q35

Which three critical design blocks or functional areas benefit from HA design solutions? (Choose three.)

A. home office

B. collocation
C. WAN

D. campus

E. data center

Answer: ADE

Q36

VLANs provide separation of which type of domain?

A. routing domains

B.collision domains

C.multicast domains

D.broadcast domains

Answer: D

Q37

□ OS

Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)

A. Hardware redundancy is not necessary for the wireless clients in your design.

B.Redundant WAN connections are unnecessary in your design.

C.You need to include network redundancy in your design.

D. You need to include redundant wireless access points in your design.

Answer: CD

Q38

Which statement is true in regards to VRRP?

A. The VRRP members must contain two identical routing platforms.

B. The VRRP members use a control link between the two nodes.

C.The VRRP members use an FXPO link between the two nodes.

D.The VRRP members can contain two different routing platforms.

Answer: D

Q39

You are designing a network in which access between different groups must be tightly restricted. What
should you do to accomplish this task?
A. Use a switch with Layer 2 ACLs to control the traffic.

B. Use a Web filtering device to control Layer 7 traffic.

C. Use a firewall with security policies to control the traffic.

D. User a router with Layer 3 ACLs to control the traffic.

Answer: C

Q40

Your customer wants to ensure that their data center is completely prepared for a disaster recovery
scenario. What would you recommend?

A. Deploying decentralized management.

B. Deploying dual uplinks to separate ISPs.

C. Deploying a Data Center Interconnect.

D. Deploying centralized management.

Answer: C

Q41

You must design a network requires a VPN technology that employs low application latency between
spoke devices. The customer has also stated that they do not wish to use PKI certificates as a form of
authentication. Which VPN technology should you recommend in this situation?

A. hub-and-spoke VPN

B. full mesh VPN

C. advpn

D. SSL VPN

Answer: B

Q42

Which Junos Space application can be used to manage L3 VPNs on MX devices?

A. Connectivity Services Director

B. Network Director

C. Log Director

D. Security Director

Answer: A

Q43
Which Junos Space application can be used to store and manage events for SRX devices?

A. Connectivity Services Director

B. Network Director

C. Security Director: Logging and Reporting

D. Network Management Platform

Answer: C

Q44

Which application would be used to manage Juniper EX Series switches?

A. Network Director

B. Services Activation Director

C. Log Manager

D. Security Director

Answer: A

Q45

You are gathering information to determine capacity, density, and scaling of systems for a campus
switching design. What information is critical to the design? (Choose three.)

A. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS machines)

B. the number of guest users or contractors accessing with a mobile hot spot

C. the number of physical VoIP phones not connected to a desktop

D. the number of users that are home office/mobile workers

E. the number of users with a fixed desktop station and attached IP phone

Answer: AC

Q46

Network Director is an example of which type of network management application?

A. centralized

B. op script

C. on-box

D. out-of-band

Answer: A
Q47

In regards to a Junos Space deployment, which two statements are true? (Choose two.)

A. Junos Space typically uses the eth0 interface to manage devices through the OOB network.

B. Junos Space can only communicate with devices through it's eth3 interface.

C. Junos Space typically uses the eth3 interface to manage devices through the in-band network.

D. Junos Space can only communicate with devices through it's eth0 interface.

Answer: AC

Q48

You must design a network for a large campus building with many users who are in different
departments. Which technology should you use for your design?

A. VLAN

B. BGP

C. GRE

D. RIP

Answer: A

Q49

Which two statements are true in regards to network capacity planning? (Choose two.)
A. The application behavior is not important.
B. The network management platform is important.
C. The network management platform is not important.
D. The application behavior is important.
Answer: CD

Q50

Your customer has deployed Juniper devices and network devices from other vendors in their network.
They would like you to propose a data correlation and logging solution that will work with Juniper
devices, as well as the network devices from the other vendors in their network. Which solution would
you propose in this situation?

A. Juniper Secure Analytics

B. Connectivity Services Director

C. Security Director: Logging and Reporting

D. Contrail Cloud
Answer: A

Q51

Connectivity issues have been seen by the users in remote offices when attempting to access resources
at the corporate headquarters. You must design a fix for this issues. Which technology should you
include in your design?

A. redundant WAN links

B. auto-discovery VPN

C. hub-and-spoke VPN

D. accelerated WAN links

Answer: A

Q52

You customer has had troubles in the past with his STP implementations and has asked you to design a
Layer 2 network that doesn't require STP. Which technology can you recommend to the customer?

A. Virtual Chassis

B. VSTP

C. IPsec

D. VLANs

Answer: A

Q53

Your customers new data center contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)

A. EIGRP

B. VXLAN

C. CDP

D. MACsec

Answer: BD

Q54

Your customers new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. IGRP

B. RSTP

C. PVST+

D. LLDP

Answer: BD

Q55

Your customers new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)

A. GLBP

B. PAgP

C. ISIS

D. LACP

Answer: CD

Q56

What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)

A. Multiple devices are inter-connected into a single logical device.

B. It supports up to 40 Gbps interfaces.

C. It supports up to 10 Gbps interfaces.

D. One devices is broken up into multiple logical devices.

Answer: AB

Q57

Which automation tool can you use to automate Junos OS platforms?


A. PyEZ
B. SQL
C. C#
D. PHP

Answer: A

Q58

Your customer’s new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)

A. VPLS

B. HSRP

C. VTP

D. VRRP

Answer: AD

Q59

Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI?
(Choose two.)

A. OSPF

B. RSTP

C. EVPN

D. GRE

Answer: CD

Q60

Which automation tool can you use to automate Junos OS platforms?

A. HTML2.0

B. Janus
C. Chef

D. OpenView

Answer:

Q61

Which two statements properly describe Junos event scripts? (Choose two.)
A. Junos event scripts are triggered automatically.

B. Junos event scripts can be used to monitor the overall status of the device.

C. Junos event scripts are triggered manually.

D. Junos event scripts cannot be used to monitor the overall status of the device.

Answer: AB

Q62

Which two data center network architectures might be proposed by other vendors to compete with
Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.)

A. SONET

B. TRILL

C. FCoE

D. three-tier architecture

Answer: BD

Q63

Which data-interchange format is used to automate JUNOS?

A. JSON

B. FORTRAN

C. C++

D. JAVA

Answer: A

Q64

Your customer’s new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)

A. IGMPV2

2. DTP

3. DVMRP

4. PIM

Answer: AD

You might also like