JNCDA - Voucher Assessment
JNCDA - Voucher Assessment
A. You should create the physical design before the physical design.
C. You should create the logical design before the physical design.
Answer: BC
Q1
Which two statements are correct in regards to modularity in your network design?
Answer: BD
Q2
In an SRX Series environment, what would you use to manage your network's firewall policy?
A. Security Director
B.Network Director
D.Virtual Director Q4
Answer: A
Q3
Answer: AD
Q4
Answer: AC
Q5
The connectivity and throughput requirements RFP element contains which two items? (Choose two.)
C.Traffic analysis
Answer:BC
Q6
A.Security only needs to be considered after the network is in place and functioning.
Answer: CD
Q7
What are the two main sub-phases of the plan methodology? (Choose two.)
A. Scope
B. Build
C. Access
D. Design
Answer: CD
Q8
The business continuity RFP element contains which two requirements? (Choose two.)
A.Traffic requirements
B.QoS requirements
Answer: BC
Q9
Your customer has indicated that they are about to acquire another organization and integrate that
acquisition into their corporation. Which two major areas must be examined as part of the network
design? (Choose two.)
B.protocol incompatibilities
Answer: AB
Q10
The modular requirements RFP element contains which two items? (Choose two.)
C.Traffic analysis
Answer: AD
Q11
Answer: BD
Q12
When analyzing customer requirements, what are two of the categories that customer requirements can
be organized into? (Choose two.)
A.Assess
B.Core
C.Availability
D.Security
Answer: CD
Q13
You are the network administrator for a large university, and are ready to upgrade your network. You
want to solicit multiple vendors for design suggestions to help you define your plan moving forward.
Which two methods should you employ? (Choose two.)
Answer: C,A
Q14
Which two statements are true in regards to the Test the Plan step of business continuity planning?
(Choose two.)
A. You should only test the plan if the risk-assessment shows that more than 10% of the customer's
revenue is at risk.
C. You should only test the plan if the risk-assessment shows that more than 20% of the customer's
revenue is at risk.
Answer: BD
Q15
What are two important considerations with respect to the customer's IT organization which might affect
your design? (Choose two.)
Answer: AD
Q16
What is the second step of the Juniper recommended executive summary structure of an RFP?
C.Relevant supporting information outlining why the customer should choose your plan.
Answer: B
Q17
You are asked to provide a network design for a project which spans the needs of multiple organizational
entities. Which key contact will you need to help define success for this activity?
Answer: A
Q18
Which two statements are true in regards to the technical specifications section of an RFP? (Choose
two.)
D.It should contain the logical and physical topology design requirements.
Answer: BD
Q19
What are the first two steps of business continuity planning? (Choose two.)
Answer: AB
Q20
a□s
What are two ways that a user's business model is important for network design purposes? (Choose
two.)
Answer: BD
Q21
Which statements is true in regards to the Formulate the Plan step of business continuity planning?
C. You should list all the functions and services in the network.
Answer: A
Q22
Answer: AC
Q23
What is the forth step of the Juniper recommended executive summary structure of an RFP?
D. Relevant supporting information outlining why the customer should choose your plan.
Answer: D
Q24
Which two statements are true in regards to the solution overview section of an RFP? (Choose two.)
Answer: AB
Q25
D. process for selecting protocols, address schemes, naming conventions, and so forth.
Answer: C
Q26
In which two situations does power supply redundancy make sense in a network design? (Choose two.)
Answer: AD
Q27
What are three relevant considerations for determining the appropriate amount of bandwidth for a site?
(Choose three.)
Answer: ABC
Q28
You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
A. Redundant power supplies for network devices.
B. High bandwidth uplink.
C. Virtual Chassis for EX devices.
D. SFP interfaces.
Answer: AC
Q29
Which two statements are true regarding chassis clustering? (Choose two.)
A.The chassis cluster uses an FXP10 link between the two nodes.
B. The chassis cluster uses a fabric link between the two nodes.
Answer: BC
Q30
You must design a campus that involves Ethernet switches that will be using Cat 6 copper cables. What
the maximum distance between the Ethernet switches?
A. 1000 meters
B.1000 feet
C.100 feet
D.100 meters
Answer: D
Q31
In which two situations does physical device redundancy make sense in a network design? (Choose two.)
Answer: BC
Q32
You are designing a highly resilient network, which two high availability techniques should you use?
(Choose two.)
Answer: AD
Q33
Which two statements are true regarding chassis clustering? (Choose two.)
A.The chassis cluster uses a control link between the two nodes.
C. The chassis cluster must contain two identical SRX Series devices.
D. The chassis cluster uses an FXPO link between the two nodes.
Answer: AC
Q34
What are two valid reasons to enable route summarization? (Choose two.)
Answer: BC
Q35
Which three critical design blocks or functional areas benefit from HA design solutions? (Choose three.)
A. home office
B. collocation
C. WAN
D. campus
E. data center
Answer: ADE
Q36
A. routing domains
B.collision domains
C.multicast domains
D.broadcast domains
Answer: D
Q37
□ OS
Which of the two statements are true in regards to campus redundancy best practices? (Choose two.)
A. Hardware redundancy is not necessary for the wireless clients in your design.
Answer: CD
Q38
B. The VRRP members use a control link between the two nodes.
C.The VRRP members use an FXPO link between the two nodes.
Answer: D
Q39
You are designing a network in which access between different groups must be tightly restricted. What
should you do to accomplish this task?
A. Use a switch with Layer 2 ACLs to control the traffic.
Answer: C
Q40
Your customer wants to ensure that their data center is completely prepared for a disaster recovery
scenario. What would you recommend?
Answer: C
Q41
You must design a network requires a VPN technology that employs low application latency between
spoke devices. The customer has also stated that they do not wish to use PKI certificates as a form of
authentication. Which VPN technology should you recommend in this situation?
A. hub-and-spoke VPN
C. advpn
D. SSL VPN
Answer: B
Q42
B. Network Director
C. Log Director
D. Security Director
Answer: A
Q43
Which Junos Space application can be used to store and manage events for SRX devices?
B. Network Director
Answer: C
Q44
A. Network Director
C. Log Manager
D. Security Director
Answer: A
Q45
You are gathering information to determine capacity, density, and scaling of systems for a campus
switching design. What information is critical to the design? (Choose three.)
A. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, PoS machines)
B. the number of guest users or contractors accessing with a mobile hot spot
E. the number of users with a fixed desktop station and attached IP phone
Answer: AC
Q46
A. centralized
B. op script
C. on-box
D. out-of-band
Answer: A
Q47
In regards to a Junos Space deployment, which two statements are true? (Choose two.)
A. Junos Space typically uses the eth0 interface to manage devices through the OOB network.
B. Junos Space can only communicate with devices through it's eth3 interface.
C. Junos Space typically uses the eth3 interface to manage devices through the in-band network.
D. Junos Space can only communicate with devices through it's eth0 interface.
Answer: AC
Q48
You must design a network for a large campus building with many users who are in different
departments. Which technology should you use for your design?
A. VLAN
B. BGP
C. GRE
D. RIP
Answer: A
Q49
Which two statements are true in regards to network capacity planning? (Choose two.)
A. The application behavior is not important.
B. The network management platform is important.
C. The network management platform is not important.
D. The application behavior is important.
Answer: CD
Q50
Your customer has deployed Juniper devices and network devices from other vendors in their network.
They would like you to propose a data correlation and logging solution that will work with Juniper
devices, as well as the network devices from the other vendors in their network. Which solution would
you propose in this situation?
D. Contrail Cloud
Answer: A
Q51
Connectivity issues have been seen by the users in remote offices when attempting to access resources
at the corporate headquarters. You must design a fix for this issues. Which technology should you
include in your design?
B. auto-discovery VPN
C. hub-and-spoke VPN
Answer: A
Q52
You customer has had troubles in the past with his STP implementations and has asked you to design a
Layer 2 network that doesn't require STP. Which technology can you recommend to the customer?
A. Virtual Chassis
B. VSTP
C. IPsec
D. VLANs
Answer: A
Q53
Your customers new data center contains network devices from multiple vendors. You have been asked
to propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. EIGRP
B. VXLAN
C. CDP
D. MACsec
Answer: BD
Q54
Your customers new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. IGRP
B. RSTP
C. PVST+
D. LLDP
Answer: BD
Q55
Your customers new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. GLBP
B. PAgP
C. ISIS
D. LACP
Answer: CD
Q56
What are two benefits of the virtual chassis fabric (VCF) technology? (Choose two.)
Answer: AB
Q57
Answer: A
Q58
Your customer’s new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. VPLS
B. HSRP
C. VTP
D. VRRP
Answer: AD
Q59
Which two technologies can you use to stretch Layer 2 traffic between two data centers over a DCI?
(Choose two.)
A. OSPF
B. RSTP
C. EVPN
D. GRE
Answer: CD
Q60
A. HTML2.0
B. Janus
C. Chef
D. OpenView
Answer:
Q61
Which two statements properly describe Junos event scripts? (Choose two.)
A. Junos event scripts are triggered automatically.
B. Junos event scripts can be used to monitor the overall status of the device.
D. Junos event scripts cannot be used to monitor the overall status of the device.
Answer: AB
Q62
Which two data center network architectures might be proposed by other vendors to compete with
Juniper Networks Virtual Chassis Fabric (VCF) solution? (Choose two.)
A. SONET
B. TRILL
C. FCoE
D. three-tier architecture
Answer: BD
Q63
A. JSON
B. FORTRAN
C. C++
D. JAVA
Answer: A
Q64
Your customer’s new network contains network devices from multiple vendors. You have been asked to
propose two technologies that will work among all the vendors' networking equipment. Which two
technologies can you recommend for the design? (Choose two.)
A. IGMPV2
2. DTP
3. DVMRP
4. PIM
Answer: AD