Your manager asks you to determine a reliable, cost-effective solution to connect a building access switch to a building distribution switch at a distance of 400 feet (120 meters) in the same building.
What would you use in this scenario?
A. UTP
B. multimode fiber
C. PoE
D. Wi-Fi bridge
Explanation:
The distance required is 120 meters (400 feet). IEEE 802.3ab (1000BASE-T) specifies a maximum segment length of 100 meters for UTP due to signal attenuation and collision domain limits. Exceeding 100 meters risks CRC errors, packet loss, and link instability, making UTP unreliable for this application.
Multimode fiber (MMF) supports 1000BASE-SX up to 220–550 meters (depending on core diameter) with low signal loss, immunity to electromagnetic interference, and full reliability at 120 meters. Though slightly higher initial cost than UTP, MMF is the cost-effective standard-compliant choice compared to single-mode fiber or wireless alternatives, and it ensures long-term stability for building distribution-to-access connections.
Why other options are incorrect:
A. UTP– Fails at 120 meters (exceeds 100m limit); unreliable per Ethernet standards.
C. PoE – Power over Ethernet is a capability (power + data over UTP), not a transmission medium; it doesn’t solve the distance limitation of UTP.
D. Wi-Fi bridge – Unreliable due to RF interference, latency, and shared medium; unsuitable for a wired distribution-access link requiring deterministic performance.
Reference:
IEEE 802.3-2022 (Clause 40: 1000BASE-T, 100m limit)
IEEE 802.3z (Clause 38: 1000BASE-SX MMF reach)
Juniper Networks Design, Associate (JNCIA-Design): Campus LAN cabling distances and media selection
Which Juniper ATP Cloud feature detects threats in HTTPS without decryption?
A. Encrypted Traffic Insights
B. DNSSEC
C. Paragon Active Assurance
D. SSL
Explanation:
Juniper ATP Cloud’s Encrypted Traffic Insights uses machine learning to analyze encrypted traffic metadata (e.g., TLS handshake parameters, cipher suites, certificate attributes, flow characteristics) to identify malicious patterns without decrypting HTTPS traffic. This preserves privacy and performance while detecting command-and-control (C2) communications, beaconing, and tunneling over TLS.
Why other options are incorrect:
B. DNSSEC
– Domain Name System Security Extensions provides authenticity and integrity for DNS responses, but does not inspect HTTPS traffic or detect threats inside encrypted sessions.
C. Paragon Active Assurance
– A Juniper network test and monitoring solution for SLA validation, not a threat detection feature of ATP Cloud.
D. SSL
– Secure Sockets Layer is a deprecated cryptographic protocol (predecessor to TLS). "SSL" by itself is not a detection feature; full decryption of SSL/TLS is precisely what Encrypted Traffic Insights avoids.
Reference:
Juniper ATP Cloud Datasheet: "Encrypted Traffic Insights uses ML on TLS metadata to detect threats without decryption"
Juniper TechLibrary: Configuring Encrypted Traffic Insights (SRX Series)
You are gathering information to determine capacity, density, and scaling of systems for a campus switching design.
What information is critical to the design? (Choose three.)
A. the number of guest users or contractors accessing with a mobile hot spot
B. the number of unmanned IP-enabled end systems (e.g., HVAC, network printers, POS machines
C. the number of users with a fixed desktop station and attached IP phone
D. the number of physical VoIP phones not connected to a desktop
E. the number of users that are home office/mobile workers
Explanation :
Capacity, density, and scaling in campus switching design require accurate forecasts of network endpoints that consume switch ports, PoE power, and MAC address table entries.
B. Unmanned IP-enabled systems (HVAC, printers, POS machines)
– Critical because these consume switch ports, often require PoE (e.g., POS, some sensors), and increase MAC address and ARP table loads. They do not follow human work schedules and run 24×7, affecting power and thermal planning.
C. Fixed desktop station with attached IP phone
– Each user in this scenario consumes two switch ports (one for phone, one for PC daisy-chained, or two separate drops) and PoE for the phone. This directly impacts port density, PoE budget, and uplink oversubscription calculations.
D. Physical VoIP phones not connected to a desktop – Each such phone consumes one switch port plus PoE (typically Class 3 or 4). These are dense in lobbies, hallways, warehouses, and must be factored into per-switch port count and total PoE capacity.
Why other options are incorrect:
A. Guest users with mobile hotspots
– Hotspots bypass campus switching infrastructure (they use cellular or guest Wi-Fi), so they do not affect wired switch capacity, density, or scaling.
E. Home office/mobile workers
– These users rarely connect to campus switching at all; they impact VPN concentrators or wireless design, not wired campus switch capacity.
Reference:
Juniper JNCIA-Design Study Guide:Campus LAN design – capacity planning (port density, PoE, endpoint types)
Cisco / generic best practices (similar): Network design – identifying managed vs unmanaged endpoints, fixed vs mobile users
Which VPN protocol has the highest overhead?
A. GRE over MPLS
B. IPsec with NAT Traversal
C. Secure Vector Routing
D. IPsec without NAT Traversal
Explanation:
IPsec with NAT Traversal (NAT-T) has the highest overhead among the listed options. NAT-T encapsulates IPsec traffic inside UDP port 4500 and adds an extra UDP header (8 bytes) plus a non-ESP marker, on top of standard IPsec ESP/AH overhead. This results in total overhead up to ~73–93 bytes per packet (including outer IP + UDP + ESP + NAT-T fields), significantly reducing maximum transmission unit (MTU) and increasing fragmentation.
Why other options have lower overhead:
A. GRE over MPLS
– Generic Routing Encapsulation adds ~24 bytes (4-byte GRE + outer IP + MPLS label stack). MPLS labels are small (4 bytes each), and no encryption or NAT handling is added. Lower overhead than IPsec+NAT-T.
C. Secure Vector Routing (SVR)
– A Juniper protocol that uses source-verified routing and lightweight integrity checks; designed for low overhead compared to traditional VPNs, far less than IPsec+NAT-T.
D. IPsec without NAT Traversal
– Uses ESP directly with IP protocol 50; overhead is ~38–58 bytes (outer IP + ESP trailer + auth). Absence of UDP header and extra NAT-T fields makes overhead smaller than NAT-T.
.
Reference:
IETF RFC 3948 (UDP Encapsulation of IPsec ESP Packets – NAT-T)
Juniper TechLibrary: IPsec VPN MTU and overhead calculations
JNCIA-Design objectives: VPN design – protocol comparisons, overhead impact on WAN links
Which two switches should you recommend as leaf nodes for a small data center where cost is a factor? (Choose two.)
A. EX4300
B. QFX5700
C. EX4400
D. QFX5130
Explanation:
For a small data center where cost is a factor, you should recommend access-layer switches that can serve as leaf nodes in a spine-and-leaf fabric while keeping expenses manageable.
A. EX4300
– A cost-effective access switch officially supporting data center top-of-rack (ToR) deployments. It can operate as a leaf in a Virtual Chassis Fabric (VCF) spine-and-leaf topology alongside QFX5100 spines . Supports 40GbE uplinks for interconnecting to spines .
C. EX4400
– A modern, cloud-ready access switch supporting EVPN-VXLAN and Virtual Chassis for data center ToR deployments. Offers 10/25/40/100GbE uplinks and advanced telemetry .
Why the other options are NOT recommended when cost is a factor:
B. QFX5700
– A high-end modular data center spine switch with chassis base prices of
80
,
000
–
80,000–91,000+ . Delivers 25.6 Tbps throughput but is grossly oversized and expensive for a small data center leaf node .
D. QFX5130 – While less expensive than QFX5700 (priced ~
76
,
000
–
76,000–96,000) , it is still a 400GbE data center spine/leaf switch based on Broadcom Trident 4 silicon . Its cost is far higher than EX4300/EX4400, making it unsuitable when cost is a primary factor.
Reference
Juniper EX4300 Datasheet: Data center access & VCF leaf support
Juniper EX4400 Datasheet: Data center ToR & EVPN-VXLAN support
Juniper QFX5700/5130 pricing & positioning
What is a design consideration for using IBGP for the underlay in a Clos data center fabric?
A. A full mesh of IBGP neighbors will be required.
B. BGP ADD-PATH must be enabled for multipath to work on leafs.
C. An IGP will always be required for learning loopback addresses.
D. A 5-stage Clos topology will not work with IBGP underlay.
Explanation:
In a Clos (spine-and-leaf) data center fabric using IBGP for the underlay, a fundamental design consideration is that IBGP does not advertise routes learned from one IBGP neighbor to another IBGP neighbor (the IBGP split-horizon rule). To ensure all leaf and spine routers learn complete reachability information (e.g., loopback IPs used for overlay tunnels), every IBGP speaker must be directly peered with every other IBGP speaker – a full mesh. In a Clos fabric with *n* routers, this creates IBGP sessions, which scales poorly beyond small deployments.
Why other options are incorrect:
B. BGP ADD-PATH
– ADD-PATH allows advertisement of multiple best paths, but IBGP multipath for load balancing does not strictly require it; equal-cost multipath (ECMP) can work with standard IBGP if next-hops are identical. ADD-PATH is useful but not a requirement.
C. An IGP (e.g., OSPF, IS-IS)
– An IGP is not always required. Loopbacks can be learned via static routes, direct IBGP peering over directly connected interfaces, or using BGP’s next-hop-self without an IGP, though an IGP simplifies management.
D. 5-stage Clos topology
– IBGP underlay works perfectly well with 5-stage Clos (e.g., leaf–spine–super-spine). Topology stage count does not break IBGP; the full-mesh requirement remains regardless of stages.
Reference:
RFC 4271 (BGP): IBGP split-horizon rule
Juniper TechLibrary: IBGP in data center fabrics – full mesh necessity
JNCIA-Design objectives: Data center design – underlay protocol choices (IBGP vs. eBGP vs. IGP)
Where are path selections made for an SD-WAN router?
A. physical interface card
B. local packet forwarding engine
C. local routing engine
D. centralized controller
Explanation:
In SD-WAN architecture, the centralized controller (also called the SD-WAN controller or orchestrator) is responsible for path selection decisions. The controller maintains a global view of the network, monitors WAN link performance (latency, jitter, loss), and computes optimal paths based on application SLAs and policies .
The controller distributes routing decisions to edge routers via protocols like Overlay Management Protocol (OMP). Edge routers receive and install these routes in their local forwarding tables but do not make independent path selection decisions .
Why other options are incorrect:
A. physical interface card – Hardware component for packet I/O; performs no routing logic or path selection.
B. local packet forwarding engine – Forwards traffic based on pre-installed forwarding table entries; does not select paths.
C. local routing engine – Maintains local routes but relies on centralized controller for SD-WAN overlay path decisions; local routing typically applies only to site-local routing (BGP/OSPF) .
Reference:
Juniper JNCIA-Design: SD-WAN architecture – centralized control plane
Cisco SD-WAN documentation: "Centralized control policy provisioned on the Cisco vSmart Controller... orchestrating routing decisions"
Which two features does Secure Web Gateway provide? (Choose two.)
A. name resolution services
B. proxy services
C. application queuing services
D. firewall services
Explanation:
A Secure Web Gateway (SWG) provides core security functions for web traffic. Based on Juniper's official documentation, an SWG protects web access by enforcing acceptable use policies and preventing web-borne threats . This is accomplished through two primary mechanisms:
B. proxy services
– SWG operates as an explicit or transparent proxy, acting as an intermediary between users and the internet . The proxy intercepts web requests, inspects them against security policies, and blocks malicious content before it reaches the end user.
D. firewall services
– Juniper SWG integrates Firewall-as-a-Service (FWaaS) capabilities, identifying applications and inspecting traffic for exploits and malware with over 99.8% effectiveness . Additionally, SSL/TLS proxy and inspection are standard features .
Why other options are incorrect
A. name resolution services
– This refers to DNS, which is a separate network function not provided by SWG. Name resolution is typically handled by DNS servers or services like DNSSEC.
C. application queuing services
– Queuing relates to quality of service (QoS) or traffic shaping, not web security. SWG focuses on threat prevention and policy enforcement, not packet queuing.
Reference
Juniper Networks:Secure Edge - Key Features (SWG with FWaaS integration)
Juniper Pathfinder:Explicit web proxy and transparent web proxy functionality
Your company requires the ability to quickly recover from a misconfigured router breaking its forwarding and control planes. They decide to deploy terminal servers with connections to all router console ports to provide this capability.
Which two strategies will satisfy the requirements? (Choose two.)
A. Connect the terminal servers using a switch connected to inet6.0 on the production network routers.
B. Connect the terminal servers using a 4G LTE modem.
C. Connect the terminal servers using a parallel network of separate routers.
D. Connect the terminal servers using a switch connected to a separate routing instance on the production network routers.
Explanation:
The requirement is to recover from a misconfigured router that has broken its own forwarding and control planes. Out-of-band management (OOBM) is needed—access that does not rely on the misconfigured router's production network paths.
B. 4G LTE modem
– Provides a completely independent, out-of-band path to terminal servers. Even if the router's forwarding/control planes are corrupted, cellular connectivity remains available for console access.
D. Separate routing instance on production routers
– A dedicated routing instance (e.g., mgmt_junos) isolated from the main inet.0 table can carry management traffic over the same physical links but using separate logical interfaces, VRFs, and next-hops. This avoids dependence on the misconfigured production routing table.
Why other options are incorrect:
A. Connect via switch to inet6.0 on production network
– Still relies on the same broken production routing table (inet6.0). If the router's forwarding/control plane is compromised, management access fails.
C. Parallel network of separate routers
– Overly complex and expensive. Terminal servers do not need separate router hardware; a direct OOB link (LTE or isolated VLAN) suffices.
Reference:
Juniper TechLibrary: Out-of-band management best practices – use of LTE or dedicated management routing instances
JNCIA-Design objectives: Network resiliency – console server access during control plane failure
Which two statements are correct about the Juniper Connected Security strategy? (Choose two.)
A. It extends attack mitigation to routers and switches.
B. It extends attack mitigation to network chokepoints.
C. It extends security to all user connections.
D. It extends security to every point of connection on the network.
Explanation:
Juniper's Connected Security strategy transforms the entire network into a unified, threat-aware enforcement architecture. Instead of relying solely on perimeter firewalls, it distributes security enforcement across all network devices. Official Juniper documentation describes this as a strategy that "extends security to every point of connection on the network," turning routers, switches, and firewalls into automated defense layers. This approach specifically addresses the threat of lateral movement by blocking infected hosts at the access layer (the switch port) before an attack can spread across the data center or campus.
Why Option A is Correct (Attack mitigation on routers and switches):
The strategy explicitly extends security enforcement to the routing and switching infrastructure. For example, JUNOS software integrates "SecIntel" (Security Intelligence) into MX Series routers, allowing them to block command-and-control (C&C) traffic at the hardware level. Simultaneously, EX and QFX switches act as enforcement points to quarantine infected hosts, preventing lateral movement without needing a firewall at every access port.
Why Option D is Correct (Every point of connection):
This is the core architectural pillar of Connected Security. As noted in the official Juniper blog and technical documentation, the framework secures users, applications, and infrastructure regardless of architecture—spanning physical switches, routers, firewalls, private clouds (Contrail/VMware NSX), and public clouds (AWS/Azure).
Why the other options are incorrect:
B. It extends attack mitigation to network chokepoints.
This is incorrect because it misrepresents the design. "Chokepoint" security (i.e., inspecting traffic only at a central point like a perimeter firewall) is precisely the legacy model that Connected Security evolved beyond to address lateral movement.
C. It extends security to all user connections.
This is too narrow. While user connections are covered, the strategy's primary differentiation lies in protecting unmanned infrastructure (IoT, HVAC, POS systems) and cloud workloads, not just user endpoints.
References:
Juniper Networks Official Definition: "Juniper Connected Security... extends security to every point of connection on the network to safeguard applications, data and infrastructure"
Architecture & Enforcement: "Juniper Connected Security... turning connectivity layers into automated defense layers... extending security intelligence and enforcement to all points of connection"
Which aspect of network design facilitates future growth and troubleshooting efforts?
A. business continuity
B. high availability
C. modularity
D. security
Explanation:
Modularity in network design means building the network from discrete, functional building blocks (e.g., access, distribution, core, data center, WAN edge) that can be scaled, upgraded, or troubleshot independently. This directly facilitates both future growth and troubleshooting efforts because:
Future growth – Modules can be expanded or replicated without redesigning the entire network. Adding a new building, floor, or campus follows the same modular pattern.
Troubleshooting efforts – Fault isolation is faster when problems are contained within a module. Engineers can test or replace a module without affecting unrelated parts of the network.
Why other options are incorrect:
A. Business continuity
– Focuses on disaster recovery and operational resilience after failures. While important, it does not inherently simplify scaling or troubleshooting.
B. High availability
– Provides redundancy and failover but does not reduce design complexity or aid in systematic fault isolation. A high-availability network can still be monolithic and hard to troubleshoot.
D. Security
– Protects against threats but often adds complexity; by itself, security does not streamline growth or troubleshooting.
Reference:
Juniper JNCIA-Design Study Guide: Hierarchical and modular design principles
Cisco PPDIOO / Juniper Network Design Best Practices: Modularity enables scalability and fault isolation
As a network architect, where would you add PTX Series routers?
A. core network
B. access network
C. cellular edge
D. branch location
Explanation:
The Juniper PTX Series (Packet Transport Routers) are high-performance, high-density routers designed specifically for service provider core networks, internet exchange points (IXPs), and large-scale data center interconnect (DCI) roles. They feature massive forwarding capacity (multi-terabit to petabit scale), support for high-speed interfaces (100GbE, 400GbE, and emerging 800GbE), and optimized architectures for MPLS, segment routing, and long-haul optical transport. Placing PTX routers in the core ensures efficient aggregation and forwarding of enormous traffic volumes with low latency and high availability.
Why other options are incorrect:
B. Access network
– The access layer requires low-cost, high-port-density switches (e.g., EX Series) or customer premises equipment. PTX routers are far too expensive and powerful for access.
C. Cellular edge
– Cellular edge requires devices like MX Series routers or dedicated mobile gateway solutions. PTX lacks native LTE/5G radio or small-cell integration.
D. Branch location – Branches need compact, cost-effective routers (e.g., SRX300 or ACX Series). PTX chassis are large, power-hungry, and designed for carrier-grade central offices, not branch closets.
Reference:
Juniper PTX Series Datasheet: "Designed for service provider core and high-capacity data center interconnect"
JNCIA-Design objectives: Device positioning – core vs. access vs. edge roles
| Page 1 out of 6 Pages |
| 12 |
Real-World Scenario Mastery: Our JN0-1103 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Design - Associate (JNCIA-Design) exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive JN0-1103 practice exam questions pool covering all topics, the real exam feels like just another practice session.