Download Juniper Networks Certified Design Associate (JNCDA).JN0-1101.BrainDumps.2019-07-29.40q.vcex

Vendor: Juniper
Exam Code: JN0-1101
Exam Name: Juniper Networks Certified Design Associate (JNCDA)
Date: Jul 29, 2019
File Size: 270 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
When discussing network reliability, what does the term “five nines” mean?
  1. The network is up 99.999% of the time.
  2. The network is up .99999% of the time.
  3. The network is up 9.9999% of the time.
  4. The network is up .09999% of the time.
Correct answer: A
Question 2
Which component triggers the quarantine of an infected endpoint?
  1. ALG
  2. firewall
  3. Policy Enforcer
  4. switch
Correct answer: C
Question 3
You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. 
For which purpose would you collect this information?
  1. risk assessment
  2. redundancy
  3. high availability
  4. disaster recovery
Correct answer: A
Question 4
You are asked to provide a design proposal for a service provider network. The design must ensure that customers are able to send Layer 2 traffic between sites. 
In this scenario, which VPN technology would be used to accomplish this task?
  1. IPsec VPN
  2. Layer 3 VPN
  3. GRE
  4. EVPN
Correct answer: D
Question 5
You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. 
Which two solutions would meet the requirements? (Choose two.)
  1. MPLS Layer 3 VPN
  2. GRE tunnels over the Internet
  3. VPLS Layer 2 VPN
  4. IPsec tunnels over the Internet
Correct answer: CD
Question 6
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. 
In this scenario, which type of security design would fulfill this requirement?
  1. a centralized security appliance
  2. a container-based security deployment
  3. a physical security device connected to each host
  4. an all-in-one virtual security device in each host
Correct answer: B
Question 7
Which tool in a Juniper Networks SDSN solution is responsible for telling Juniper and third-party network switches to block a threat in real time?
  1. Policy Enforcer
  2. Sky ATP
  3. Juniper Secure Analytics
  4. SRX Series device
Correct answer: B
Question 8
What is the first step of business continuity planning?
  1. know your network
  2. test the plan
  3. assess the risk
  4. formulate the plan
Correct answer: A
Question 9
You are evaluating an existing network to determine requirements for a network upgrade. 
In this scenario, which statement is true?
  1. A network baseline identifies devices that do not have redundant components.
  2. A network baseline identifies traffic growth patterns across network devices.
  3. A network baseline identifies how many users are connected to the network.
  4. A network baseline identifies the type and level of traffic load on the network.
Correct answer: D
Question 10
You are performing a risk assessment for a network design. 
Which statement is true in this scenario?
  1. Some risks can be safely ignored.
  2. The likelihood of a risk occurring should not be considered.
  3. A network must be designed for an uptime of five nines.
  4. All identified risks must have a mitigation plan in place.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!