Juniper JN0-1103 Real Exam Questions
The questions for JN0-1103 were last updated at Dec 09,2024.
- Exam Code: JN0-1103
- Exam Name: Design, Associate (JNCIA-Design)
- Certification Provider: Juniper
- Latest update: Dec 09,2024
You are designing a network design in which access between different groups must be tightly restricted.
What should you do to accomplish this task?
- A . A Layer 7 IDP
- B . A Layer 3 switch
- C . A Layer 4 firewall
- D . A Layer 2 switch
What are two aspects of greenfield projects? (Choose two.)
- A . New networks with few or no restraints to consider.
- B . Old equipment that should be replaced.
- C . Legacy applications that are no longer used.
- D . Next-generation networks created from the ground up.
Which data-interchange format is used to automate JUNOS?
- A . JSON
- B . Fortran
- C . C++
- D . Java
You are developing a network monitoring strategy to track network response time and availability. The monitoring strategy should be scalable to accommodate future network growth.
Which two statements are true in this scenario? (Choose two.)
- A . Network reachability monitoring functions should be centralized to a dedicated monitoring device.
- B . RPM allows the monitoring of reachability, but does not allow delay or jitter monitoring.
- C . Network reachability monitoring functions should be delegated to each network device.
- D . RMON is a standardized system that is not vendor specific.
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)
- A . WAN edge
- B . aggregation
- C . core
- D . access
An RFP response should include which three items (Choose three.)
- A . Executive summary
- B . Bill of materials
- C . A solution overview
- D . technical specifications
Which design boundary is caused by the customer’s existing physical environment?
- A . Marketing users are not permitted access to the company’s financial servers.
- B . Current infrastructure lacks the media to interconnect buildings with each other.
- C . Key stakeholders disagree on how the funding for the project should be spent.
- D . HTTP traffic is expected to increase on the network by 57% over the next two years.
A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device.
Which three measurements do you need to satisfy the company’s requirement? (Choose three.)
- A . the number of physical desktop ports
- B . the number of power over Ethernet ports
- C . the number of guest access users
- D . the number of unmanned IP enabled end-point systems
the number of WLAN access points
Network Director is an example of which type of network management application?
- A . on-box
- B . out-of-band
- C . centralized
- D . op script
You are working with a customer who specializes in selling custom toy boxes in more than 50 stores. The customer’s financial information must be kept secure.
Which security standard should you include in your design proposal?
- A . user-based firewall
- B . NAC
- C . BYOD
- D . PCI compliance