100+ Juniper JNCIA-Cloud (JN0-211) Multiple Choice Questions With Answers

Juniper Questions Answers Techhyme

The Juniper JNCIA-Cloud (JN0-211) certification exam is designed to validate the knowledge and skills of networking professionals who are new to cloud networking. The exam covers a wide range of topics, including:

  • Cloud fundamentals
  • Network function virtualization (NFV)
  • Software-defined networking (SDN)
  • Juniper Networks cloud solutions

The exam is 90 minutes long and consists of 65 multiple-choice questions. A passing score is 70%.

To prepare for the exam, you can use the following resources:

  • The Juniper JNCIA-Cloud (JN0-211) Exam Study Guide
  • The Juniper JNCIA-Cloud (JN0-211) Practice Exams
  • The Juniper JNCIA-Cloud (JN0-211) Online Training

The Juniper JNCIA-Cloud (JN0-211) certification is a valuable credential for networking professionals who want to demonstrate their skills in cloud networking. The certification can help you advance your career and gain new opportunities in the cloud networking field.

Here are some additional tips for preparing for the Juniper JNCIA-Cloud (JN0-211) exam:

  • Start studying early and give yourself plenty of time to prepare.
  • Create a study schedule and stick to it.
  • Focus on the areas where you need the most improvement.
  • Take practice exams to assess your progress and identify areas where you need more practice.
  • Get help from a qualified instructor or tutor if you need it.
  • Stay positive and don’t give up!

Question 1: Which type of topology is shown in the exhibit.

A. Spine-and-leaf topology
B. Tree topology
C. ERP topology
D. Hub-and-spoke topology

Answer: A

Question 2: AppFormix has been deployed in your data center using the Juniper Telemetry interface (JTI) native sensors. However, the underlay devices have not yet been set up to work with the JTI native sensors. Which action is required for the JTI native sensors to work properly?

A. Enable the SSH on the underlay devices
B. Install the AppFormix network agent on the underlay devices
C. Enable the GPB messaging on the underlay devices
D. Enable the NETCONF over SSH on the underlay devices

Answer: C

Question 3: Which statement is correct about an overlay network?

A. An overlay network requires an OSPF area
B. An overlay network requires The CLOS architectures
C. An overlay network Uses tunneling technologies
D. An overlay network Must have switches interconnected in space-leaf implementation

Answer: C

Question 4: What are two protocols used by the NorthStar controller to discover the network topology? (Choose two).

A. SNMP
B. BGP-LS
C. NETCONF
D. OSPF-TE

Answer: B, D

Question 5: You are deploying a vMX device in your network. Which two virtualized components are required in this scenario? (choose two)

A. Virtual chassis fabric
B. Virtual forwarding plane
C. Virtual chassis port
D. Virtual control plane

Answer: B, D

Question 6: What are two objectives of SDN? (Choose two).

A. Physical separation of the control plane from the data plane
B. Centralization of the forwarding plane
C. Centralization of the control plane
D. Centralization of the services plane

Answer: A, C

Question 7: What are two examples of SaaS ? (choose two).

A. Google Apps
B. Amazon web services
C. Salesforce
D. IBM cloud

Answer: B, C

Question 8: Which two data models are supported for the Junos Telemetry interface (JTI)? (Choose two).

A. Azure application insights
B. OpenConfig
C. Native Sensors
D. Amazon Kinesis

Answer: B, C

Question 9: Which two statement are true about virtualized platforms? (Choose two ).

A. The vSRX must have two vCPUs dedicated the vCP
B. The vMX uses one VM to host the vCP and vFP
C. The vMX uses separate VMs to host the vCP and vFP
D. The vSRX must have One vCPUs dedicated the vCP

Answer: C, D

Question 10: You are deploying a layer 2 underlay network with 2,000 devices and hosts. Which two statement are correct? (Choose two).

A. RSTP can used for loop prevention
B. Network routing tables can become very large and unmanageable
C. The MAC tables can become very large and unmanageable
D. RPF is used for loop prevention

Answer: A, C

Question 11: You are asked to reduce traffic on an MPLS VFN by automatically moving the traffic to an internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?

A. NorthStar
B. AppFormix
C. Contrail cloud
D. Contrail SD-WAN

Answer: A

Question 12: Which two Juniper devices are used as a CSO CPE device? (Choose two).

A. NFX
B. SRX
C. MX
D. QFX

Answer: A, B

Question 13: Which interface is used by applications, orchestration systems, and other types of business systems to communicate with an SDN controller?

A. Controller interface
B. Northbound interface
C. East-west interface
D. Southbound interface

Answer: B

Question 14: Which statement describes AppFormix?

A. AppFormix is a high-performance virtual device that secures virtualized and cloud environments
B. AppFormix is the SDN automation platform for OpenStack Iaas
C. AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
D. AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments

Answer: C

Question 15: What are two characteristics of Juniper’s connected security solution? (Choose two)

A. Centralized management
B. Manual secure policy control
C. Dynamic VPN connection
D. Enforcement everywhere on the network

Answer: A, D

Question 16: What is and advantage of the Junos Telemetry Interface(JTI) over SNMP?

A. JTI can push data more frequently
B. JTI can pull data more frequently
C. JTI always transfer data over HTTP
D. JTI never transfers data over UDP

Answer: A

Question 17: Which statement is correct about SDN?

A. SDN simplifies the network by combining the control and forwarding plane into a single controller
B. The SDN controller must provide a manual method for configuration
C. The configuration and management of an SDN solution should be distributed to the edge of the network
D. The SDN controller has a view of the network

Answer: D

Question 18: Which statement is correct when deploying services inside containers?

A. Services have dedicated processor and memory resources on each server
B. Services must not be deployed using the same operating system
C. Containers can always be deployed for free
D. Containers use fewer resources then VMs

Answer: D

Question 19: You are using service chains. In this scenario, which component launches the NFV VM?

A. Orchestrator
B. Compute node
C. vRouter
D. NorthStar Controller

Answer: B

Question 20: which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

A. Service orchestration
B. Virtual network functions
C. Infrastructure orchestration
D. Physical telco cloud infrastructure

Answer: A

Question 21: Referring to the exhibit, Server-1 has an infection and is communicating with a command and control server on the internet. You want to ensure that the infection on server-1 does not infect server-2. Which two actions accomplish this task? (Choose two)

A. Deploy Sky ATP with C&C protection.
B. Deploy Sky ATP with anti-malware protection
C. Deploy policy enforcer to isolate infected hosts
D. Deploy Sky ATP with Geo IP protection

Answer: B, C

Question 22: You are using the NorthStar controller to manage your WAN. You are required to remove a node from the network for maintenance. You want to compute and provision alternate forwarding paths so that traffic is re-routed around the node being taken offline for maintenance. Which NorthStar controller feature would be used in this scenario?

A. Maintenance mode
B. Shared risk link groups
C. Node diversity
D. Path diversity

Answer: D

Question 23: You are the administrator of an MPLS WAN intermittent WAN hardware failure are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements. Which Juniper Networks solution would be used to analyze this problem?

A. Network director
B. Contrail
C. NorthStar Planner
D. AppFormix

Answer: C

Question 24: You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second. Which product accomplishes this task?

A. NFX
B. MX
C. cSRX
D. vSRX

Answer: C

Question 25: Which mechanism allows tenants to interconnect across an overly network?

A. EBGP connections
B. P2P OSPF adjacencies
C. Subnets
D. Tunnels

Answer: D

Question 26: Which two protocols provide loop prevention in an underlay network? (Choose two)

A. OSPF
B. VPLS
C. MSTP
D. EVPN

Answer: A, C

Question 27: Which statements are correct about the NFV framework? (Choose two)

A. A spine and leaf implementation is an example of the NFV framework
B. The NFV framework is defined by ANSI
C. The NFV framework is defined by ETSI
D. The NFV Framework enables horizontally scalable deployments of services

Answer: C, D

Question 28: Devices in your data center have become unwilling participants of botnet attacks. In this scenario. Which security technology should you use to stop this behavior?

A. IPsec
B. Policy enforcer
C. Sky ATP C&C threat protection
D. Sky ATP GeoIP threat protection

Answer: C

Question 29: You want to automate the management of virtualized applications using contrail networking. Which type of SDN is used in this scenario?

A. API SDN
B. OpenFlow SDN
C. Ansible automation
D. Overly SDN

Answer: A

Question 30: Which protocol is used by the NorthStar controller to discover existing tunnels in a service provider or large enterprise WAN?

A. SNMP
B. REST
C. PCEP
D. NETCONF

Answer: C, D

Question 31: What are two characteristics of policy Enforcer? (Choose two)

A. Policy Enforcer has its own standalone GUI
B. Policy Enforcer is integrated with security director
C. Policy Enforcer provides telemetry data for a collector device
D. Policy Enforcer consolidates threat information from multiple sources

Answer: B, D

Question 32: Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)

A. Telemetry data is exported from the control plane
B. Additional software must be installed on the Junos device
C. Telemetry data is exported from the data plane
D. No additional software must be installed on the Junos device

Answer: B, C

Question 33: You need to control and steer application traffic while maintaining an end-to-end view of the WAN and LAN. Which juniper cloud product will satisfy the requirements in the scenario?

A. SKY ATP
B. Contrail cloud
C. Sky enterprise
D. Contrail service orchestration

Answer: B

Question 34: Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)

A. TFTP
B. PCEP
C. NETCONF
D. HTTPS

Answer: B, C

Question 35: What are two reason to use a vMX over a physical MX series in your deployment? (Choose two)

A. A vMX provides more routing features
B. A vMX has a lower barrier of entry
C. A vMX accelerates adding new services
D. A vMX increases analytic capabilities

Answer: B, C

Question 36: Which two statement describe cloud? (choose two)

A. cloud CPE allows multivendor, open support of software- based functions
B. cloud CPE requires heavy investment in vendor-specific hardware
C. cloud CPE encourages administrators to use all-in one appliances
D. cloud CPE eliminates the need for investing in expensive hardware

Answer: A, D

Question 37: which two benefits does the JUNOS telemetry interface (JTI) provide in an AppFormix architecture? (choose two)

A. JTI enables you to deploy security policies to vSRX devices
B. JTI enable you to collect and export data from resources such as firewall filters
C. JTI uses an SNPM pull model to eliminate additional processing
D. JTI uses a push model to deliver data asynchronously

Answer: B, D

Question 38: You are required to set up zero-day malware detection for you private cloud without sending files off site analysis. What will accomplish this task?

A. Sky ATP
B. UTM
C. JATP
D. IDP

Answer: A

Question 39: Which statement about contrail is true?

A. The contrail controller places a vRouter each virtual host in the network
B. The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances
C. The contrail virtual router segments virtual machines on physical hosts into different security zones
D. The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network

Answer: A, B

Question 40: Which OpenStack service manage image storage?

A. Glance
B. Swift
C. Nova
D. Heat

Answer: A

Question 41: You must set up multiple collection points across your network to look for malware and rogue SSH attempts. What will allow you to accomplish this task?

A. AppFormix
B. NorthStar
C. networking
D. JATP

Answer: D

Question 42: You are deploying a layer 3 underlay network with 10,000 devices and hosts. Which two statements are correct in this scenario? (choose two.)

A. Loop prevention is provided by the routing protocol
B. Routing table can become very large
C. RSTP can be used for loop prevention
D. The MAC tables can become very large

Answer: A, B

Question 43: Which type of tunnels are provisioned by the NorthStar controller?

A. IPsec VPNs
B. VPLs
C. MPLS LSPs
D. GRE over UDP

Answer: C

Question 44: A company requests increased bandwidth during two specific periods each year. Which solution will accomplish the desired result?

A. NorthStar planner
B. NorthStar bandwidth calendaring
C. NorthStar maintenance Mode
D. Centralized Path computation

Answer: B

Question 45: A customer is planning a significant upgrade to their network that requires an increase in bandwidth. They want to schedule the increase for a specific date and time. Which feature within the NorthStar controller allows you to automate this process?

A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner

Answer: C

Question 46: Which two features does the Junos Telemetry interface (JTI) support? (Choose two).

A. JTI provides real-time telemetry.
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models

Answer: A, D

Question 47: What is a primary difference between NFV and VNF?

A. A VNF defines the network underlay tunnel methodology while NFV is firewall that inspects traffic in the overlay network.
B. NFV is the framework that describes how a virtual function should operate while VNF is the virtual function itself
C. A VNF operates on a bare metal server while NFV operates on a switch
D. NFV identifies the host on which the VNF operates.

Answer: B

Question 48: Your company has three connections consisting MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links. Which product will facilitate this requirement?

A. Contrail cloud
B. Contrail networking
C. Contrail SD-WAN
D. Contrail SD-LAN

Answer: C

Question 49: Which type of API does contrail service orchestration provide when connecting with OSS and BSS applications?

A. TLS
B. REST
C. XMPP
D. SOAP

Answer: B

Question 50: Which two statement are true about vSRX firewalls? (Choose two).

A. The vSRX does not use static CPU reservations.
B. The host OS can be different from the guest OS.
C. The host OS and image OS must match
D. The vSRX uses static CPU reservation

Answer: B, D

Question 51: You want to secure sensitive data and detect malware in your network. Which component would be used to satisfy this requirement?

A. AppFormix
B. Sky ATP
C. Network director
D. Contrail cloud

Answer: B

Question 52: Which message type is supported by the Junos Telemetry interface?

A. GPB
B. OpenShift
C. JET
D. YANG

Answer: A

Question 53: Which two statement describe virtual network functions (VNFs)? (Choose two)

A. VNFs are provided at a customer’s site or telco cloud
B. VNFs represent the service that monitors and tracks whether the services are performing according to design
C. VNFs represent the infrastructure the comprises the telco underlay network
D. VNFs can be deployed as a software function within a single x86 platform

Answer: A, C

Question 54: Which statement is correct about alarms in AppFormix?

A. Static alarm are compared against fixed thresholds
B. Alarm thresholds cannot be changed by the user
C. Alarm actions cannot be change by the user
D. Static alarms are compared against historical data

Answer: A

Question 55: Which two capabilities are supported with the cSRX firewall? (Choose two)

A. IPS
B. Routing instances
C. Layer 2 deployment
D. Chassis clustering

Answer: A, B

Question 56: What are three software suites that contribute to cloud architectures? (Choose three.)

A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack

Answer: A, D, E

Question 57: What are two technologies that a vMX’s control plane uses to communicate with the forwarding plane on the same server? (Choose two.)

A. OVSDB
B. SIR-IOV
C. Virtio
D. 802.1Q

Answer: B, C

Question 58: Click the Exhibit button. Which type of SDN is shown in the exhibit?

A. SDN as an overlay
B. OpenFlow-based SDN
C. SDN as an underlay
D. API-based SDN

Answer: D

Question 59: Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization?

A. Contrail security
B. Contrail services orchestration
C. Virtual route reflector
D. Junos Space security Director
E. Network service activator (voucher)

Answer: B

Question 60: What are two goals of cloud security automation? (Choose two)

A. To automate responses to detected security threats
B. To transition all security functions to cloud platforms
C. To implement all security functions in hardware
D. To centrally manage security policies

Answer: A, D

Question 61: Which statement defines a public cloud?

A. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations
B. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers
C. The cloud infrastructure is provisioned for open use by the general public.
D. The cloud infrastructure is a composition of two or more distinct cloud infrastructure

Answer: C

Question 62: Which two platforms share the same automation scripts? (Choose two.)

A. vMX series
B. MX series
C. Junos space
D. Contrail

Answer: A, B

Question 63: Which product is used to perform capacity planning on MPLS WANs?

A. VMware NSRX
B. NorthStar planner
C. Cloud service orchestrator
D. Contrail cloud

Answer: B

Question 64: What are two examples of SaaS ? (choose two)

A. Google Apps
B. Amazon web services
C. Salesforce
D. IBM cloud

Answer: B, C

Question 65: From where does AppFormix gather performance metrics in a network?

A. From an agent on a host or system
B. From statistics NFVs instantiated in the data path
C. From RPM probes sent across the network
D. From a REST API connection

Answer: A

Question 66: Which CSO component enables ISPs to set up and manage the virtual network and customers?

A. Designer tools
B. Service and infrastructure Monitor
C. Customer Portal
D. Administration Portal

Answer: D

Question 67: Which Juniper product provides insight into the underlay and overly network at the same time?

A. AppFormix
B. Juniper extension Toolkit
C. Edge services director
D. Security director

Answer: A

Question 68: Which Juniper product provides insight into the underlay and overly network at the same time?

A. Security director
B. Juniper extension Toolkit
C. Edge services director
D. Contrail Analytics

Answer: D

Question 69: What are two examples of public cloud providing? (Choose two)

A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services

Answer: C, D

Question 70: Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)

A. bring your own license
B. pay as you go
C. annual subscription
D. based on the number of policies

Answer: A, B

Question 71: A customer want to deploy a website that can scale as needed. Which type of service should the customer purchase in this scenario?

A. DBaaS
B. BGPaaS
C. SaaS
D. FWaaS

Answer: C

Question 72: Which protocol is used to communicate LSP and status information between the NorthStar controller and label edge routers?

A. ICCP
B. BGP
C. OSPF
D. PCEP

Answer: D

Question 73: Which two statement are true about an SDN controller? (Choose two)

A. An SDN controller regulates traffic transmission rates in network
B. An SDN controller centralizes control and configuration of a network
C. An SDN controller stores and manages software images
D. An SDN controller automates repetitive tasks in network

Answer: B, D

Question 74: Which Junos space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers?

A. Network director
B. Policy enforcer
C. Connectivity services Director
D. Edge services director

Answer: A

Question 75: Which statement is true regarding on OpenFlow controller based software defined network?

A. The control plane of each device in the network is instantiated by the controller.
B. The forwarding plane of each device in the network is programmed by the controller
C. The forwarding plan of each device in the network is managed by the device
D. The SDN controller pushes configuration files to each device in the network using RESTful APIs

Answer: B

Question 76: Which two statement are true regarding private cloud services? (Choose two)

A. A private cloud can be deployed in a service provider network
B. A private cloud cannot connect to a public cloud
C. A private cloud must apply encryption to all stored data
D. A private cloud has dedicated resources for individual customers

Answer: A, D

Question 77: According Juniper networks what is the recommended external routing protocol for the underlay network?

A. IS-IS
B. BGP
C. EGP
D. OSPF

Answer: B

Question 78: AppFormix alarm notification are sent to an HTTP server using which format?

A. JSON
B. CSV
C. XML
D. Plain text

Answer: A

Question 79: You are using the Juniper connected security solution to protect your network from malware. However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of analyzing files greater than 10MB. Which two components would allow you to accomplish this task ? (Choose two)

A. REST API server
B. Fabric Manager
C. VIM director
D. Security director

Answer: B, D

Question 80: You are using the Juniper connected security solution to protect your network from malware. However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of analyzing files greater than 10MB. Which two components would allow you to accomplish this task ? (Choose two)

A. Network director
B. Contrail security
C. Sky ATP
D. Security director

Answer: C, D

Question 81: Which CSO component enables customers to manage sites and services for their organizations?

A. Designer tools
B. Service and infrastructure Monitor
C. Customer Portal
D. Administration Portal

Answer: C

Question 82: What are two Microservices provided by contrail services orchestration? (Choose two)

A. REST API server
B. Fabric Manager
C. VIM director
D. Security director

Answer: B, D

Question 83: What is and advantage of the Junos Telemetry Interface(JTI) over SNMP?

A. JTI can push data more frequently
B. JTI can pull data more frequently
C. JTI always transfer data over HTTP
D. JTI never transfers data over UDP

Answer: A

Question 84: What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (choose two)

A. Performance
B. Basic
C. Lite
D. Enhanced

Answer: A, C

Question 85: Which statement is correct about overlay network?

A. An overlay network requires an OSPF area
B. An overlay network uses tunneling technologies
C. An overlay network requires the CLOS architecture
D. An overlay network must have switches interconnected in a spine leaf implementation

Answer: B

Question 86: Which statement is true about NFV containers?

A. NFV containers usually provide fewer functions than VM-based NFs
B. NFV containers require an underlying hypervisor for deployment
C. NFV containers take longer to instantiate than virtual machines
D. NFV containers require more memory and storage resources to deploy

Answer: A

Question 87: What are two concepts of private cloud? (choose two)

A. Resources are dedicated to your organization
B. Resources are accessed through a private connection
C. Non-critical resources are located outside of your organization
D. Resources are not secured by firewalls

Answer: A, B

Question 88: What are two characteristics of cloud computing? (Choose two)

A. Customer-owned equipment.
B. Measured service
C. Resource pooling
D. Unrestricted public access to all resources

Answer: B, C

Question 89: Which open source management framework does VMware NSX use to manage VXLANs on Junos device?

A. OVSDB
B. Contrail networking
C. OpenFlow
D. OpenConfig

Answer: A

Question 90: Which statement is true about Junos Space security director?

A. Security director is a standalone management platform
B. Security director is a centralized security policy manager
C. Security director is an SDN controller
D. Security director is a network orchestrator

Answer: B

Question 91: Which two components are part of the AppFormix architecture? (Choose two)

A. Policy controller
B. Compute node
C. SDN controller
D. Data platform

Answer: A, D

Question 92: Which organization is responsible for defining cloud computing?

A. IEEE
B. ANSI
C. NIST
D. IANA

Answer: C

Question 93: What are two characteristics of vMX series devices? (Choose two)

A. The vMX series uses carrier-grade routing optimized for the x86 environment
B. The vMX series requires a license for production environment
C. The vMX series uses a trio ASIC
D. The vMX series uses containerization technology for rapid service enablement

Answer: A, B

Question 94: Which two statement are true about SDN WAN implementations? (Choose two)

A. SDN WAN uses VXLAN to connect POPs
B. SDN WAN uses data center orchestration platforms
C. SDN WAN uses a centralized a control plane
D. SDN WAN uses MPLS tunnels to connect POPs

Answer: C, D

Question 95: What information does an underlay network use to route data?

A. Application name
B. Customer ID
C. IP address
D. Customer name

Answer: C

Question 96: You want to prevent a single point of failure in your underlay network. Which two protocols would be used to accomplish this task? (choose two)

A. LACP
B. VSTP
C. MC-LAG
D. RSTP

Answer: A, C

Question 97: Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)

A. MC-LAG
B. BGP
C. LACP
D. TRILL

Answer: A, C

Question 98: What are two roles of sandboxing in Sky ATP? (choose two)

A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis

Answer: B, D

Question 99: Which OpenStack component is responsible for user authentication and authorization?

A. Glance
B. Nova
C. Keystone
D. Neutron

Answer: C

Question 100: Which two product are required when deploying vSRX as a partner security service in VMware NSX? (Choose two)

A. VMware vROPs
B. VMware NSX manager
C. Junos Space Security Director
D. IDP sensor

Answer: B, C

Question 101: Which two hypervisors does the vMX support? (Choose two)

A. KVM
B. xen
C. ESXi
D. Hyper V

Answer: A, C

Question 102: What are two characteristics of cloud computing? (Choose two.)

A. Services are provisioned using automation.
B. Services are provisioned by the customer

Answer: A, B

Question 103: Which statement is true about the vSRX Series and VMware NSX integration?

A. The NSX Distributed Firewall provides a container based layer of protection.
B. VMware NSX provides advanced Layer 4 through Layer 7 security services.
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment.
D. The NSX Distributed Firewall users application identification.

Answer: C

Question 104: What are two major components of the NorthStar Controller system? (Choose two.)

A. PCE
B. PCC
C. CE
D. vPE

Answer: A, B

Question 105: Which type of service would allow you to provision five servers with Windows Server 2016 installed?

A. IaaS
B. PaaS
C. SaaS
D. FWaaS

Answer: B

Question 106: What are two components of the Juniper Networks SDSN solution? (Choose two.)

A. manual secure policy control
B. dynamic VPN connections
C. enforcement everywhere on the network
D. centralized management

Answer: C, D

Question 107: In which two scenarios is Contrail used? (Choose two.)

A. private cloud networking
B. network hardware lifecycle management
C. Network Functions Virtualization
D. policy-based routing

Answer: A, C

Question 108: Which method does WANDL use to collect live network information?

A. FTP
B. SOAP
C. TFTP
D. SNMP

Answer: D

Question 109: Which protocol is used to transport monitoring data in Juniper’s open and extensible data model?

A. TCP
B. SNMP
C. SOAP
D. UDP

Answer: D

Question 110: According to Juniper Networks, what is the recommended external routing protocol for the underlay network?

A. EGP
B. IS-IS
C. BGP
D. OSPF

Answer: C

Question 111: The vMX Series provides which two benefits? (Choose two.)

A. The vMX Series uses containerization technology for rapid service enablement.
B. The vMX Series uses carrier-grade routing optimized for the x86 environment.
C. The vMX Series requires a license for production environments.
D. The vMX Series uses a Trio ASIC.

Answer: B, C

You may also like:

Related Posts

Leave a Reply