Juniper JN0-211 – Multiple Choice Questions & Answers

Juniper JN0-211 Cloud Exam Question Answers Techhyme

JN0-211 exam is the current version for Cloud, Associate (JNCIA-Cloud) certification exam. We have updated JNCIA-Cloud JN0-211 practice exam tests online to help you prepare for the Cloud Associate certification exam well. The JNCIA-Junos certification is designed for networking professionals with beginner-intermediate knowledge of networking.

Also Read:

1. According to the juniper network, what is the recommended external routing protocol for the underlay network?

A. IS-IS
B. EGP
C. OSPF
D. BGP

Answer: D

2. Which two capabilities are supported with the cSRX firewall? (choose two)

A. IPS
B. routing instances
C. chassis clustering
D. Layer 2 deployment

Answer: A, C

3. Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

A. service orchestration
B. infrastructure orchestration
C. physica telco cloud infrastructure
D. virtual network functions

Answer: A

4. What are two objectives of SDN? (choose two)

A. centralization of control plane
B. physical separation of the control plane from the data plane
C. centralization of the forwarding plane
D. centralization of the services plane

Answer: A, B

5. What is an advantage of the Junos Telemetry Interface (JTI) over SNMP?

A. JTI can pull data more frequently
B. JTI always transfers data over HTTP
C. JTI never transfers data over UDP
D. JTI can push data more frequently

Answer: D

6. You have 100 small branch offices around the world. You must use a single pane of glass to monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum errors, and ports with maximum packet loss. In this scenario, which product would satisfy the requirement?

A. Contrail SD-WAN
B. Contrail SD-LAN
C. Contrail Networking
D. Contrail Cloud

Answer: A

7. Which two statements are correct about the NFV framework? (Choose two)

A. The NFV framework is defined by ANSI
B. The NFV framework is defined by ETSI
C. The NFV framework enables horizontally scalable deployments of services
D. A spine and leaf implementation is an example of the NFV framework

Answer: B, C

8. Which mechanism allows tenants to interconnect across an overlay network?

A. tunnels
B. subnets
C. EBGP connections
D. P2P OSPF adjacencies

Answer: C

9. What are two examples of SaaS? (Choose two)

A. Amazon Web Services
B. SalesForce
C. Google Apps
D. IBM Cloud

Answer: B, C

10. Which two Juniper devices are used as a CSO CPE devices? (Choose two.)

A. SRX
B. NFX
C. QFX
D. MX

Answer: A, B

11. What are two characteristics of Juniper’s Connected Security Solution? (Choose two.)

A. manual secure policy control
B. dynamic VPN connections
C. centralized management
D. enforcement everywhere on the network

Answer: C, D

12. Which two statements are true about virtualized platforms? (Choose two.)

A. The vSRX must have two vCPU dedicated to the vCP
B. The vMX used separate VMs to host the vCP and vFP
C. The vSRX must have one vCPU dedicated to the vCP
D. The vMX uses one VM to host the vCP and vFP

Answer: B, C

13. You are responsible for optimizing a global MPLS WAN. You must determine the optimal MPLS forwarding paths and automate the provisioning of the forwarding paths into the network. Which Juniper Networks SDN solution will satisfy the requirements?

A. NorthStar Controller
B. Policy Enforcer
C. Contrail
D. Network Director

Answer: A

14. Which two benefits does the Junos Telemetry Interface (JTI) provide in an AppFormix architecture?(Choose two.)

A. JTI enables you to deploy security policies to vSRX devices
B. JTI uses a push model to deliver data asynchronously
C. JTI enables you to collect and export data from resources such as firewall filters
D. JTI uses an SNMP pull model to eliminate additional processing

Answer: B, C

15. Devices in your data center have become unwilling participants of botnet attacks. In this scenario, which security technology should you use to stop this behavior?

A. Policy Enhancer
B. Sky ATP GeoIP threat protection
C. Sky ATP C&C threat protection
D. IPsec

Answer: C

16. Which statement is true regarding an OpenFlow controller-based software defined network?

A. The forwarding plane of each device in the network is programmed by the controller
B. The control plane of each device in the network is instantiated by the controller
C. The SDN controller pushes configuration files to each device in the network using RESTful APIs
D. The forwarding plane of each device in the network is managed by the device

Answer: A

17. What are two technologies that a vMX’s control plane uses to communicate with the forwarding plane on the same servers?(Choose two.)

A. 802.1Q
B. Virtio
C. SR-IOV
D. OVSDB

Answer: B, C

18. Which interface is used by applications, orchestration system, and other types of business systems to communicate with as SDN controller?

A. controller interface
B. northbound interface
C. east-west interface
D. southbound interface

Answer: B

19. Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)

A. Azure Application Insights
B. Native Sensors
C. Amazon Kinesis
D. OpenConfig

Answer: B, D

20. You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second. Which product accomplishes this task?

A. MX
B. NFX
C. vSRX
D. cSRX

Answer: D

21. You are deploying a vMX device in your network. Which two virtualized components are required in this scenario?

A. virtual forwarding plane
B. virtual chassis port
C. virtual chassis fabric
D. virtual control plane

Answer: A, D

22. Which product is used to perform capacity planning of MPLS WANs?

A. Contrail Cloud
B. NorthStar Planner
C. Cloud Service Orchestration
D. VMware NSX

Answer: B

23. Which protocol is used by the NorthStar Controller to discover existing tunnels in a service provider or large enterprise WAN?

A. SNMP
B. PCEP
C. REST
D. NETCONF

Answer: B

24. Which two statements describe cloud CPE? (Choose two.)

A. Cloud CPE require heavy investment in vendor-specific hardware
B. Cloud CPE encourages administrators to use all-in-one appliances
C. Cloud CPE allows multi vendor, open support of software-based functions
D. Cloud CPE eliminates the need for investing in expensive hardware

Answer: B, D

25. You need to control and steer application traffic while maintaining an end-to-end view of the WAN and LAN. Which Juniper cloud product will satisfy the requirements in this scenario?

A. Sky ATP
B. Contrail Service Orchestration
C. Contrail Cloud
D. Sky Enterprise

Answer: B

26. You are deploying a Layer 2 underlay network with 2,000 devices and hosts. Which two statements are correct?

A. Network routing tables can become very large and unmanageable
B. RPF is used for loop prevention
C. The MAC tables can become very large and unmanageable
D. RSTP can be used for loop prevention

Answer: C, D

27. What are two protocols used by NorthStar Controller to discover the network topology?(Choose two)

A. SNMP
B. OSPF-TE
C. NETCONF
D. BGP-LS

Answer: B, D

28. Which type of SDN is shown in the exhibit?

A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay

Answer: A

29. AppFormix has been deployed in your data center using the Juniper Telemetry Interface (JTI) native sensors. However, the underlay devices have not yet been set up to work with the JTI native sensors. Which action is required for the JTI native sensors to work properly?

A. Install the AppFormix network agent on the underlay devices
B. Enable NETCONF over SSH on the underlay devices
C. Enable SSH on the underlay devices
D. Enable GPB messaging on the underlay devices

Answer: A

30. Which two statements are true about an SDN controller? (Choose two.)

A. An SDN controller automates repetitive tasks in a network
B. An SDN controller regulates traffic transmission rates in a network
C. An SDN controller centralizes control and configuration of a network
D. An SDN controller stores and manages software mages

Answer: A, C

31. Which CSO component enables ISPs to set up and manage the virtual network and customers?

A. Service and Infrastructure Monitor
B. Designer Tools
C. Administration Portal
D. Customer Portal

Answer: C

32. You must create a security policy that works cross your multicloud, Kubernetes, and OpenStack deployments. Which product will accomplish this task?

A. Contrail Security
B. Policy Enforcer
C. Sky ATP
D. Juniper ATP

Answer: D

33. What are three orchestrators that integrate with Contrail? (Choose three)

A. VirtualBox
B. Kubernetes
C. Ubuntu
D. OpenStack
E. vSphere

Answer: B, D, E

34. You are using the NorthStar Controller to manage your WAN. You are required to remove a node from the network for maintenance purposes. You want to compute and provision alternate forwarding paths so that traffic is re-touted around the node being taken offline for maintenance. Which NorthStar Controller feature would be used in this scenario?

A. path diversity
B. maintenance mode
C. shared risk link groups
D. node diversity

Answer: B

35. You are using service chains. In this scenario, which component launches the NFV VM?

A. vRouter
B. NorthStar Controller
C. compute node
D. orchestrator

Answer: D

36. Your company has three connections consisting of MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links. Which product will facilitate this requirement?

A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN

Answer: A

37. Which two statements are true regarding private cloud services? (Choose two.)

A. A private cloud must apply encryption to all stored data
B. A private cloud has dedicated resources for individual customers
C. A private cloud can be deployed in a service provider network
D. A private cloud cannot connect to a public cloud

Answer: B, C

38. You are required to set up zero-day malware dedication for your private cloud without sending files off site for analysis. What will accomplish this task?

A. JATP
B. IDP
C. UTM
D. Sky ATP

Answer: D

39. Which two statements are true about cSRX firewalls? (Choose two.)

A. The host OS can be different from the guest OS
B. The host OS and image OS must match
C. The cSRX does not use static CPU reservations
D. The cSRX uses static CPU reservations

Answer: A, D

40. Which statement defines a public cloud?

A. The cloud infrastructure is a composition of two or more strict cloud infrastructures
B. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns
C. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers
D. The cloud infrastructure is provisioned for open use by the general public

Answer: D

41. Which statement is correct about SDN?

A. The SDN controller has a centralized view of the network
B. The SDN controller must provide a manual method for configuration
C. SDN simplifies the network by combining the control and forwarding planes into a single controller
D. The configuration and management of an SDN solution should be distributed to the edge of the network

Answer: A

42. AppFormix alarm notification are sent to an HTTP server using which format?

A. plain text
B. XML
C. CSV
D. JSON

Answer: D

43. What are two examples of public cloud providers? (Choose two.)

A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services

Answer: C, D

44. From where does AppFormix gather performance metrics in a network?

A. from RPM probes sent across the network
B. from statistics NFVs instantiated in the data path
C. from an agent on the host or system
D. from a REST API connection

Answer: C

45. What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)

A. A vMX provides more routing features.
B. A vMX accelerates adding new services
C. A vMX has a lower barrier of entry
D. A vMX increases analytic capabilities

Answer: B, D

46. You want to automate the management of virtualized applications using Contrail Networking. Which type of SDN is used in this scenario?

A. OpenFlow SDN
B. API SDN
C. Overlay SDN
D. Ansible Automation

Answer: B

47. Which statement is correct about overlay network?

A. An overlay network requires an OSPF area.
B. An overlay network must have switches interconnected in a spineleaf implementation
C. An overlay network uses tunneling technologies
D. An overlay network requires the CLOS architecture

Answer: C

48. Which juniper product provides insight into the underlay and overlay network at the same time?

A. Security Director
B. AppFormix
C. Edge Services Director
D. Juniper Extension Toolkit
E. Contrail Analysitcs

Answer: E

49. What are two characteristics of Policy Enforcer? (Choose two)

A. Policy Enforcer has its own standalone GUI
B. Policy Enforcer consolidated threat information from multiple sources
C. Policy Enforcer provides telemetry data for a collector device
D. Policy Enforcer is integrated with Security Director

Answer: B, D

50. Which protocol used to communicate LSP and status information between NorthStar controller and label edge routers?

A. PCEP
B. ICCP
C. OSPF
D. BGP

Answer: A

51. Which type of the topology is shown in the exhibit?

A. EGP topology
B. spine-and-leaf topology
C. tree topology
D. hub-and-spoke topology

Answer: B

52. Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization?

A. Contrail Service Orchestration
B. Contrail Security
C. Virtual Route Reflector
D. Junos Space Security Director

Answer: B

53. Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers?

A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director

Answer: C

54. Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution?

A. Administration Portal
B. AppFormix
C. Designer Tools
D. Customer Portal
E. Service and Infrastructure Monitor

Answer: E

55. What are two characteristics of cloud computing? (Choose two.)

A. customer-owned equipment
B. measured service
C. resource pooling
D. unrestricted public access to all resources

Answer: B, C

56. You are the administrator of an MPLS WAN. Intermittent WAN hardware failures are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements. Which Juniper Networks solution would be used to analyze this problem?

A. Network Director
B. AppFormix
C. NorthStar Planner
D. Contrail

Answer: D

57. What are two goals of cloud security automation? (Choose two)

A. to centrally manage security policies
B. to transition all security functions to cloud platforms
C. to automate responses to detected security threats
D. to implement all security functions in hardware

Answer: A, C

58. You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an Internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?

A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN

Answer: D

59. Which statement is correct when deploying services inside containers?

A. Containers can always be deployed for free
B. Containers use fewer resources than VMs
C. Services have dedicated processor and memory resources on each server
D. Service must not be deployed using the same operating system

Answer: B

60. Server-1 has an infection and is communicating with a command and control server on the Internet. You want to ensure that the infection on Server-1 does not infect Server-2? Which two actions accomplish this task?(Choose two.)

A. Deploy Sky ATP with advanced anti-malware protection
B. Deploy Sky ATP with C&C protection
C. Deploy Policy Enhancer to isolate infected host
D. Deploy Sky ATP with GeoIP protection

Answer: A, B

61. Which two platforms share the same automation scripts? (Choose two)

A. vMX Series
B. MX Series
C. Junos Space
D. Contrail

Answer: A, B

62. Which two protocols provide loop prevention in underlay network? (Choose two.)

A. OSPF
B. VPLS
C. EVPN
D. MSTP

Answer: B, D

63. Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)

A. pay as you go
B. bring your own license
C. based on the number of policies
D. annual subscription

Answer: A, B

64. Which two statements are correct when using the native sensors model for the Juniper Telemetry Interface with AppFormix? (Choose two.)

A. Telemetry data is exported from the data plane
B. Additional software must be installed on the Juniper device
C. No additional software must be installed on the Juniper device
D. Telemetry data is exported from the control plane

Answer: A, C

65. A customer want to deploy a website that can scale as needed. Which type of services should the customer purchase in this scenario?

A. DBaaS
B. SaaS
C. BGPaaS
D. FWaaS

Answer: B