Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > Design Track Certification > JN0-1103

JN0-1103 Design - Associate (JNCIA-Design) Question and Answers

Question # 4

According to the WLA Standards Framework, which phase of wireless network design involves meeting with the customer to collect business and technical requirements?

A.

the Deploy phase

B.

the Design phase

C.

the Define phase

D.

the Diagnose phase

Full Access
Question # 5

What are two prerequisites of capacity planning in a network design? (Choose two.)

A.

predicting traffic projections for future growth

B.

understanding historical application behavior

C.

understanding current application behavior

D.

understanding historical growth

Full Access
Question # 6

Where are path selections made for an SD-WAN router?

A.

physical interface card

B.

local packet forwarding engine

C.

local routing engine

D.

centralized controller

Full Access
Question # 7

Which two products comprise Juniper’s SASE solution? (Choose two.)

A.

Juniper

B.

Juniper Secure Edge

C.

Paragon Active Assurance

D.

Mist Al-Driven SD-WAN

Full Access
Question # 8

In an EVPN-VXLAN data center, what would be a reason to consider using discrete border leafs rather than placing border roles onto the spines?

A.

to provide for differentiated oversubscription ratios for traffic into and out of the data center

B.

to eliminate multicast traffic in and out of the fabric

C.

to allow for provisioningACLs between the data center and the WAN

D.

to provide specific devices designed for handlingtraffic burstiness on the WAN

Full Access
Question # 9

Which two statements are correct about the Juniper Connected Security strategy? (Choose two.)

A.

It extends attack mitigation to routers and switches.

B.

It extends attack mitigation to network chokepoints.

C.

It extends security to all user connections.

D.

It extends security to every point of connection on the network.

Full Access
Question # 10

SD-WAN routes security-sensitive data across MPLS, VPNs, and _______________.

A.

Internet circuits

B.

dark fiber

C.

wireless

D.

microwave

Full Access
Question # 11

Click the Exhibit button.

Which type of IP fabric is shown in the exhibit?

A.

collapsed fabric

B.

5-stage IP fabric

C.

7-stage IP fabric

D.

3-stage IP fabric

Full Access
Question # 12

Click the Exhibit button.

Which two WAN functions are shown in the exhibit? (Choose two.)

A.

Data Center Interconnect

B.

WAN aggregation

C.

Internet edge

D.

private WAN

Full Access
Question # 13

Which aspect of network design facilitates future growth and troubleshooting efforts?

A.

business continuity

B.

high availability

C.

modularity

D.

security

Full Access
Question # 14

You are asked to design a branch WAN. The branch sites have limited bandwidth and it is imperative to limit overhead.

Which technology will satisfy the requirements?

A.

Secure Vector Routing

B.

Generic Routing Encapsulation

C.

IPsec

D.

EVPN-VXLAN

Full Access
Question # 15

Multiple customer sites are connected through your service provider network using a Layer 3 VPN. You must design the Layer 3 VPN so that the traffic sent between sites is encrypted.

Which technology would you use to accomplish this task?

A.

Use IPsec with AH.

B.

Use GRE with a key sequence number.

C.

Use IPsec with ESP.

D.

Use OSPF with IPsec authentication.

Full Access
Question # 16

In which two instances should you use Postman as part of network automation? (Choose two.)

A.

to connect network infrastructure with cloud applications

B.

to write custom scripts in the Python programming language

C.

to receive real-time updates from a device without polling

D.

to perform prototyping of API requests

Full Access
Question # 17

Which VPN protocol has the highest overhead?

A.

GRE over MPLS

B.

IPsec with NAT Traversal

C.

Secure Vector Routing

D.

IPsec without NAT Traversal

Full Access
Question # 18

Which two statements about network management are correct? (Choose two.)

A.

Fault management can discover problems before they cause downtime.

B.

Authorization validates that a user is who they claim to be.

C.

Measurement of network performance, errors, and security allows administrators to make informed decisions.

D.

Network management is added after the network is built and network designers do not need to consider it.

Full Access
Question # 19

What is a design consideration for using IBGP for the underlay in a Clos data center fabric?

A.

A full mesh of IBGP neighbors will be required.

B.

BGP ADD-PATH must be enabled for multipath to work on leafs.

C.

An IGP will always be required for learning loopback addresses.

D.

A 5-stage Clos topology will not work with IBGP underlay.

Full Access