Download Juniper.JN0-1101.TestKing.2019-03-15.39q.vcex

Download Exam

File Info

Exam Juniper Networks Certified Design Associate (JNCDA)
Number JN0-1101
File Name Juniper.JN0-1101.TestKing.2019-03-15.39q.vcex
Size 181 KB
Posted Mar 15, 2019
Download Juniper.JN0-1101.TestKing.2019-03-15.39q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

When discussing network reliability, what does the term “five nines” mean?


  1. The network is up 99.999% of the time.
  2. The network is up .99999% of the time.
  3. The network is up 9.9999% of the time.
  4. The network is up .09999% of the time.
Correct answer: A



Question 2

Which component triggers the quarantine of an infected endpoint?


  1. ALG
  2. firewall
  3. Policy Enforcer
  4. switch
Correct answer: C



Question 3

You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. 
In this scenario, which VPN technology would be used to accomplish this task?


  1. IPsec VPN
  2. Layer 3 VPN
  3. GRE
  4. EVPN
Correct answer: D



Question 4

You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. 
Which two solutions would meet the requirements? (Choose two.)


  1. MPLS Layer 3 VPN
  2. GRE tunnels over the Internet
  3. VPLS Layer 2 VPN
  4. IPsec tunnels over the Internet
Correct answer: CD



Question 5

You are asked to provide a design proposal for an enterprise customer that currently has a three-tier switching infrastructure. The customer wants your design to collapse their Layer 2 infrastructure into two distinct layers. 
In this scenario, what are two benefits of moving to the new infrastructure? (Choose two.)


  1. The total number of devices is increased.
  2. The overall network performance is increased.
  3. The number of connections between devices is decreased.
  4. The number of protocols used is decreased.
Correct answer: BC



Question 6

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. 
In this scenario, which type of security design would fulfill this requirement?


  1. a centralized security appliance
  2. a container-based security deployment
  3. a physical security device connected to each host
  4. an all-in-one virtual security device in each host
Correct answer: B



Question 7

Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network switches to block a threat in real time?


  1. Policy Enforcer
  2. Sky ATP
  3. Juniper Secure Analytics
  4. SRX Series device
Correct answer: B



Question 8

Which Juniper automation tool enables administrators to write custom Python scripts that use the Junos XML API?


  1. REST Explorer
  2. JSNAPy
  3. JET
  4. PyEZ
Correct answer: D



Question 9

You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. 
Which statement is true in this situation?


  1. The connection should be secured using IPsec.
  2. The WAN edge devices must support MPLS.
  3. The connections support Layer 2 traffic bridging.
  4. The service provider can isolate traffic in a private MPLS instance.
Correct answer: A



Question 10

What are two features used to enable high availability? (Choose two.)


  1. VRRP
  2. chassis clustering
  3. full-duplex mode
  4. SNMP
Correct answer: AB









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files