Exam4Training

Juniper JN0-1302 Data Center Design Specialist (JNCDS-DC) Online Training

Question #1

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

  • A . The vSRX is performing microsegmentation
  • B . The vSRX is working in transparent mode.
  • C . The vSRX is working in routed mode
  • D . The vSRX is not performing microsegmentation

Reveal Solution Hide Solution

Correct Answer: A,C
Question #2

Which two Layer 2 Data Center Interconnect redundancy options support active/active forwarding? (Choose two.)

  • A . VPLSLAG
  • B . point-to-point LAG
  • C . EVPN multihoming
  • D . VPLS multihoming

Reveal Solution Hide Solution

Correct Answer: C,D
Question #3

Your company wants to expand operations and build small data centers in locations where it is difficult to maintain physical routing equipment. You must recommend a Juniper product that minimizes this issue.

Which product would you recommend in this situation?

  • A . MX104
  • B . vMX
  • C . vRR
  • D . Virtual Chassis

Reveal Solution Hide Solution

Correct Answer: B
Question #4

Which three statements about Contrail Networking are true? (Choose three.)

  • A . It is used to service chain network functions.
  • B . It is used to program physical network functions.
  • C . It is used to virtualize and program networks.
  • D . It is used to virtualize and program compute.
  • E . It is used to create distributed cloud storage.

Reveal Solution Hide Solution

Correct Answer: A,C,E
Question #5

Exhibit.

Which two statements about the redundancy design shown in the exhibit are true? (Choose two)

  • A . Inter-server traffic must use an alternate IP address
  • B . Multicast IP addressing is in use
  • C . User traffic must be policy-routed to the active data center
  • D . Anycast IP addressing is in use

Reveal Solution Hide Solution

Correct Answer: A,D
Question #6

What are two elements of data center security? (Choose two.)

  • A . DDoS protection
  • B . segmentation with VLANs in hypervisors
  • C . ATP Cloud advanced anti-malware
  • D . JIMS for user identify and management

Reveal Solution Hide Solution

Correct Answer: B,C
Question #7

You are asked to create an underlay network that will scale from a small system to a large system and can be integrated into a Contrail solution In this scenario, which protocol satisfies these requirements’5

  • A . EVPN
  • B . VXLAN
  • C . BGP
  • D . MPLS

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Which three statements are correct regarding a Clos-style IP fabric network? (Choose three)

  • A . Leaf nodes can be interconnected
  • B . Spine nodes can be interconnected
  • C . Leaf nodes should be connected to spine nodes
  • D . Spine nodes should not be interconnected
  • E . Leaf nodes should not be interconnected

Reveal Solution Hide Solution

Correct Answer: A
Question #9

You are designing an EVPN/VXLAN network and want to ensure that latency between VMs on the same host is as low as possible for both Layer 2 and Layer 3 traffic.

Which two design choices will accomplish this task? (Choose two.)

  • A . Configure leaf nodes as VXLAN Layer 2 gateways
  • B . Configure leaf nodes as VXLAN Layer 3 gateways
  • C . Configure spine nodes as VXLAN Layer 3 gateways
  • D . Configure spine nodes as VXLAN Layer 2 gateways

Reveal Solution Hide Solution

Correct Answer: A,C
Question #10

You are designing an IP fabric underlay using IBGP with the spines serving as route reflectors.

In this scenario, which BGP capability must be supported on the spines?

  • A . add-path
  • B . route-monitoring
  • C . rib-sharding
  • D . route-refresh-priority

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which data center architecture is open, flexible, and uses Layer 3 only?

  • A . STP
  • B . IP fabric
  • C . virtual chassis
  • D . MC-LAG

Reveal Solution Hide Solution

Correct Answer: B
Question #12

You are designing a new Data Center Interconnect (DCI) that will be MPLS-based where the PE routers need to learn local and remote MAC addresses.

In this scenario, which two CXI deployment methodologies satisfy this requirement? (Choose two)

  • A . VPLS
  • B . EVPN
  • C . LDP Layer 2 circuits
  • D . BGP Layer 2 VPNs

Reveal Solution Hide Solution

Correct Answer: B,C
Question #13

Which two scripting languages are supported for creating on-box scripts? (Choose two.)

  • A . Chef
  • B . Python
  • C . SLAX
  • D . Ansible

Reveal Solution Hide Solution

Correct Answer: B,C
B,C

Reference: https://www.juniper.net/documentation/us/en/software/junos/automation-scripting/automation-scripting.pdf

Question #14

Exhibit.

For a fully configured and functional IP fabric underlay as shown in the exhibit how many external BGP neighbors are expected to be in established state for Leaf 1?

  • A . 2
  • B . 5
  • C . 4
  • D . 3

Reveal Solution Hide Solution

Correct Answer: A
Question #15

A customer has concerns about various groups having the ability to easily access their corporate network infrastructure They want to implement tighter controls for network infrastructure system access

Which three actions will accomplish this task? (Choose three)

  • A . Use a secure access VPN
  • B . Open console port access
  • C . Disable root access
  • D . Use RADIUS accounting.
  • E . Provide local passwords

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #16

Which two statements describe SDN? (Choose two.)

  • A . SDN can alleviate the need for manually configuring each network device.
  • B . SDN moves forwarding functions to a centralized management platform.
  • C . SDN combines the control plane and the forwarding plane into a single fabric.
  • D . SDN moves compute intensive functions to a centralized controller.

Reveal Solution Hide Solution

Correct Answer: A,D
Question #17

Your company is deploying a private cloud based on OpenStack and has selected Contrail Networking as their SDN controller. The data center supporting this private cloud will use an IP fabric architecture consisting of QFX Series switches and MX Series routers.

Which two statements are true in this scenario? (Choose two)

  • A . SDN Gateway devices may contain per-tenant MAC and IP addresses
  • B . Each vRouter maintains separate forwarding tables for various virtual networks
  • C . All vRouters maintain identical forwarding tables for all virtual networks.
  • D . Spine and leaf devices may contain per-tenant MAC and IP addresses

Reveal Solution Hide Solution

Correct Answer: A,B
Question #18

What are two considerations when designing an IP fabric? (Choose two)

  • A . Uplinks from servers to the leaf nodes should be 40GbE links
  • B . All spine nodes should be the same type of device
  • C . Leaf nodes and spine nodes should be the same type of device
  • D . Every leaf node should have an uplink to every spine node

Reveal Solution Hide Solution

Correct Answer: C,D
Question #19

You have a highly latency-sensitive application that is mission critical to your company’s operation. In this scenario, what will enable you to identify issues within three second accuracy?

  • A . RMON1
  • B . RMON2
  • C . JTI
  • D . LDAP

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Which two Junos components does cRPD contain? (Choose two.)

  • A . Kubernetes
  • B . RIB
  • C . Kernel
  • D . MGD

Reveal Solution Hide Solution

Correct Answer: B,D

Question #21

You are asked to design a solution for your data center EVPN/VXLAN fabric that will allow connectivity for all of your service platforms, such as firewalls and load balancers into a dedicated pair of border leaf devices

Which three Juniper Networks platforms would support this requirement? (Choose three)

  • A . SRX Series
  • B . QFX10000 Series
  • C . EX4300-MP Series
  • D . 0MX Series
  • E . QFX5120 Series

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #22

Which two features add NGFW capabilities to a traditional security device” (Choose two)

  • A . IPS
  • B . UTM
  • C . IP filters
  • D . NAT

Reveal Solution Hide Solution

Correct Answer: B,C
Question #23

You are asked to design a DCI that offers policy control, active/active multihoming with load balancing, and minimizes flooding of BUM traffic.

Which DCI implementation satisfies these requirements?

  • A . EVPN
  • B . circuit cross-connect
  • C . BGP Layer 2 VPN
  • D . VPLSLAG

Reveal Solution Hide Solution

Correct Answer: A
Question #24

You must deploy a solution within your data center that will provide capacity planning for your virtual machine environment.

In this scenario, which Juniper Networks solution would accomplish this task?

  • A . Contrail Cloud
  • B . Juniper Secure Analytics
  • C . Contrail Insights
  • D . Junos Space

Reveal Solution Hide Solution

Correct Answer: A
Question #25

You are asked to design an IP fabric that uses the same routing protocol in both the underlay and overlay networks.

Which routing protocol will satisfy this requirement?

  • A . IS-IS
  • B . MPLS
  • C . OSPF
  • D . BGP

Reveal Solution Hide Solution

Correct Answer: C
Question #26

You are designing a QoS scheme for your data center. You must ensure lossless Ethernet.

What are three protocols that would be used in this scenario? (Choose three.)

  • A . TRILL
  • B . SPB
  • C . ETS
  • D . DCBx
  • E . PFC

Reveal Solution Hide Solution

Correct Answer: C,D,E
Question #27

When using BGP Layer 2 VPN for a Data Center Interconnect, which statement about MAC learning is correct?

  • A . MAC learning is not used.
  • B . Management plane MAC learning is used.
  • C . Data plane MAC learning is used.
  • D . Control plane MAC learning is used

Reveal Solution Hide Solution

Correct Answer: B
Question #28

You are implementing a new data center and need to plan to connect it to your existing data center. You have the requirement for active/active forwarding to enable load balancing and reduce failure times

Which two technologies should be evaluated for this design? (Choose two.)

  • A . point-to-point links
  • B . Layer 2 VPN
  • C . VPLS
  • D . CVPN

Reveal Solution Hide Solution

Correct Answer: A,C
Question #29

You are asked to design a new data center connection where connections between switches will be encrypted for Layer 2 traffic In this scenario, which solution will provide the required encryption^

  • A . IPsec
  • B . TLS
  • C . SSL
  • D . MACsec

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Exhibit.

Given the information shown below.

2 spine nodes with (4) 40GbE interfaces each

4 leaf nodes.

✑ Each leaf node has half-utilized (24) 10GbE interfaces,

✑ Each leaf node has (1) 40GbE interface to each of the 2 spine nodes What is the oversubscription ratio for the IP fabric shown in the exhibit?

  • A . 2:1
  • B . 1:1
  • C . 4:1
  • D . 3:1

Reveal Solution Hide Solution

Correct Answer: D

Question #31

You are designing a large IP fabric and must determine if you should use IBGP or EBGP to signal your underlay.

Which statement is correct in this scenario?

  • A . EBGP will require more BGP neighbors per device.
  • B . IBGP will require a full mesh on all devices
  • C . EBGP will require that an IGP is also configured
  • D . IBGP will allow your network to scale to larger device numbers.

Reveal Solution Hide Solution

Correct Answer: D
Question #32

You are inspecting a small data center your company just purchased You notice several blank panels and cable management system components in a storage room that are not installed on the equipment racks

In this scenario, which two statements would you include in your inspection report? (Choose two.)

  • A . The cable management system function is cosmetic only and is not necessary.
  • B . The blank panels were removed to improve cooling air flow through the racks.
  • C . The cable management system should be installed as soon as possible
  • D . The blank panels should be installed as soon as possible

Reveal Solution Hide Solution

Correct Answer: A,B
Question #33

You must implement Layer 4 security services between VMs that are hosted on the same server You require a low footprint with Docker support.

In this scenario, which Juniper Networks product would you deploy?

  • A . QFX
  • B . vSRX
  • C . cSRX
  • D . cRPD

Reveal Solution Hide Solution

Correct Answer: C
Question #34

Which statement is true about traffic prioritization?

  • A . QoS is experienced hop-by-hop
  • B . FCoE does not require DCB.
  • C . PFC and Ethernet PAUSE produce the same result
  • D . CoS is the treatment of traffic end-to-end

Reveal Solution Hide Solution

Correct Answer: D
Question #35

You are asked to design security policies based on team membership.

Which access control methodology should you use in this scenario?

  • A . non-discretionary access control
  • B . role-based access control
  • C . mandatory access control
  • D . discretionary access control

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version