Vcehome > Juniper > JNCDA > JN0-1101 > JN0-1101 Online Practice Questions and Answers

JN0-1101 Online Practice Questions and Answers

Questions 4

You are designing a WAN implementation to securely connect two remote sites to the corporate office. A

public Internet connection will be used for the connections.

Which statement is true in this situation?

A. The connection should be secured using IPsec.

B. The WAN edge devices must support MPLS.

C. The connections support Layer 2 traffic bridging.

D. The service provider can isolate traffic in a private MPLS instance.

Browse 65 Q&As
Questions 5

You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?

A. A network baseline identifies devices that do not have redundant components.

B. A network baseline identifies traffic growth patterns across network devices.

C. A network baseline identifies how many users are connected to the network.

D. A network baseline identifies the type and level of traffic load on the network.

Browse 65 Q&As
Questions 6

What are three examples of physical security? (Choose three.)

A. security cameras

B. access door keypads

C. a mantrap

D. man in the middle

E. intrusion detection and prevention

Browse 65 Q&As
Questions 7

What are three environmental characteristics that affect the campus network design? (Choose three.)

A. transmission media characteristics

B. distribution of users

C. locations of wiring closets

D. PC operating system

E. remote site connectivity

Browse 65 Q&As
Questions 8

You are required to stop zero-day threats while designing a secure network. Files are not allowed to leave

the local network.

Which Juniper Networks product will accomplish this task?

A. UTM

B. Sky ATP

C. JATP

D. SDSN

Browse 65 Q&As
Questions 9

You are asked to provide a WAN design proposal for connecting together multiple customer sites. As part of your design, you want to use IPsec tunnels to ensure that traffic is private and secure. Which statement is true about the proposed solution?

A. IPsec packets can be fragmented once encrypted.

B. IPsec tunnels will require an MPLS infrastructure through the WAN.

C. IPsec can require MTU modifications to accommodate the additional overhead.

D. Packets that are passed through an IPsec tunnel are not encrypted.

Browse 65 Q&As
Questions 10

You have multiple virtual machines in a hypervisor deployment within a data center. Your client wants to

enforce security measures on east-west traffic between virtual machines.

Which solution should you recommend in this situation?

A. JATP

B. Sky ATP

C. Virtual Chassis

D. vSRX

Browse 65 Q&As
Questions 11

What information is included in an RFP issuance?

A. design requirements

B. product features

C. product positioning

D. COGS pricing

Browse 65 Q&As
Questions 12

What are two tiers used in a traditional data center design? (Choose two.)

A. core

B. aggregation

C. compute

D. user

Browse 65 Q&As
Questions 13

You are designing a network management strategy for a new network. The requirements for the

management of network devices are shown below:

Administrator passwords must have an expiration date.

Administrators must be assigned role-specific privileges on each device.

In this scenario, which statement is true?

A. Local authentication must be used on each device.

B. A centralized AAA system must be used for authentication.

C. All devices must be configured with the same privilege levels.

D. Each user must have a unique login account.

Browse 65 Q&As
Exam Code: JN0-1101
Exam Name: Juniper Networks Certified Design Associate
Last Update:
Questions: 65 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99