Exam4Training

Juniper JN0-211 Cloud, Associate (JNCIA-Cloud) Online Training

Question #1

Which type of topology is shown in the exhibit.

  • A . Spine-and-leaf topology
  • B . Tree topology
  • C . ERP topology
  • D . Hub-and-spoke topology

Reveal Solution Hide Solution

Correct Answer: A
Question #2

AppFormix has been deployed in your data center using the Juniper Telemetry interface (JTI) native sensors. However, the underlay devices have not yet been set up to work with the JTI native sensors.

Which action is required for the JTI native sensors to work properly?

  • A . Enable the SSH on the underlay devices
  • B . Install the AppFormix network agent on the underlay devices
  • C . Enable the GPB messaging on the underlay devices
  • D . Enable the NETCONF over SSH on the underlay devices

Reveal Solution Hide Solution

Correct Answer: C
Question #3

Which statement is correct about an overlay network?

  • A . An overlay network requires an OSPF area
  • B . An overlay network requires The CLOS architectures
  • C . An overlay network Uses tunneling technologies
  • D . An overlay network Must have switches interconnected in space-leaf implementation

Reveal Solution Hide Solution

Correct Answer: C
Question #4

What are two protocols used by the NorthStar controller to discover the network topology? (Choose two).

  • A . SNMP
  • B . BGP-LS
  • C . NETCONF
  • D . OSPF-TE

Reveal Solution Hide Solution

Correct Answer: B, D
Question #5

You are deploying a vMX device in your network.

Which two virtualized components are required in this scenario? (choose two)

  • A . Virtual chassis fabric
  • B . Virtual forwarding plane
  • C . Virtual chassis port
  • D . Virtual control plane

Reveal Solution Hide Solution

Correct Answer: B, D
Question #6

What are two objectives of SDN? (Choose two).

  • A . Physical separation of the control plane from the data plane
  • B . Centralization of the forwarding plane
  • C . Centralization of the control plane
  • D . Centralization of the services plane

Reveal Solution Hide Solution

Correct Answer: A, C
Question #7

What are two examples of SaaS ? (choose two).

  • A . Google Apps
  • B . Amazon web services
  • C . Salesforce
  • D . IBM cloud

Reveal Solution Hide Solution

Correct Answer: B, C
Question #8

Which two data models are supported for the Junos Telemetry interface (JTI)? (Choose two).

  • A . Azure application insights
  • B . OpenConfig
  • C . Native Sensors
  • D . Amazon Kinesis

Reveal Solution Hide Solution

Correct Answer: B, C
Question #9

Which two statement are true about virtualized platforms? (Choose two).

  • A . The vSRX must have two vCPUs dedicated the vCP
  • B . The vMX uses one VM to host the vCP and vFP
  • C . The vMX uses separate VMs to host the vCP and vFP
  • D . The vSRX must have One vCPUs dedicated the vCP

Reveal Solution Hide Solution

Correct Answer: C, D
Question #10

You are deploying a layer 2 underlay network with 2,000 devices and hosts.

Which two statement are correct? (Choose two).

  • A . RSTP can used for loop prevention
  • B . Network routing tables can become very large and unmanageable
  • C . The MAC tables can become very large and unmanageable
  • D . RPF is used for loop prevention

Reveal Solution Hide Solution

Correct Answer: A, C

Question #11

You are asked to reduce traffic on an MPLS VFN by automatically moving the traffic to an internet circuit as long as it satisfies the SLA requirements.

In this scenario, what would you use to accomplish this task?

  • A . NorthStar
  • B . AppFormix
  • C . Contrail cloud
  • D . Contrail SD-WAN

Reveal Solution Hide Solution

Correct Answer: A
Question #12

Which two Juniper devices are used as a CSO CPE device? (Choose two).

  • A . NFX
  • B . SRX
  • C . MX
  • D . QFX

Reveal Solution Hide Solution

Correct Answer: A, B
Question #13

Which interface is used by applications, orchestration systems, and other types of business systems to communicate with an SDN controller?

  • A . Controller interface
  • B . Northbound interface
  • C . East-west interface
  • D . Southbound interface

Reveal Solution Hide Solution

Correct Answer: B
Question #14

Which statement describes AppFormix?

  • A . AppFormix is a high-performance virtual device that secures virtualized and cloud environments
  • B . AppFormix is the SDN automation platform for OpenStack Iaas
  • C . AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
  • D . AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments

Reveal Solution Hide Solution

Correct Answer: C
Question #15

What are two characteristics of Juniper’s connected security solution? (Choose two)

  • A . Centralized management
  • B . Manual secure policy control
  • C . Dynamic VPN connection
  • D . Enforcement everywhere on the network

Reveal Solution Hide Solution

Correct Answer: A, D
Question #16

What is and advantage of the Junos Telemetry Interface(JTI) over SNMP?

  • A . JTI can push data more frequently
  • B . JTI can pull data more frequently
  • C . JTI always transfer data over HTTP
  • D . JTI never transfers data over UDP

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which statement is correct about SDN?

  • A . SDN simplifies the network by combining the control and forwarding plane into a single controller
  • B . The SDN controller must provide a manual method for configuration
  • C . The configuration and management of an SDN solution should be distributed to the edge of the network
  • D . The SDN controller has a view of the network

Reveal Solution Hide Solution

Correct Answer: D
Question #18

Which statement is correct when deploying services inside containers?

  • A . Services have dedicated processor and memory resources on each server
  • B . Services must not be deployed using the same operating system
  • C . Containers can always be deployed for free
  • D . Containers use fewer resources then VMs

Reveal Solution Hide Solution

Correct Answer: D
Question #19

You are using service chains. In this scenario, which component launches the NFV VM?

  • A . Orchestrator
  • B . Compute node
  • C . vRouter
  • D . NorthStar Controller

Reveal Solution Hide Solution

Correct Answer: B
Question #20

which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

  • A . Service orchestration
  • B . Virtual network functions
  • C . Infrastructure orchestration
  • D . Physical telco cloud infrastructure

Reveal Solution Hide Solution

Correct Answer: A

Question #21

Referring to the exhibit, Server-1 has an infection and is communicating with a command and control server on the internet. You want to ensure that the infection on server-1 does not infect server-2.

Which two actions accomplish this task? (Choose two)

  • A . Deploy Sky ATP with C&C protection.
  • B . Deploy Sky ATP with anti-malware protection
  • C . Deploy policy enforcer to isolate infected hosts
  • D . Deploy Sky ATP with Geo IP protection

Reveal Solution Hide Solution

Correct Answer: B, C
Question #22

You are using the NorthStar controller to manage your WAN. You are required to remove a node from the network for maintenance. You want to compute and provision alternate forwarding paths so that traffic is re-routed around the node being taken offline for maintenance.

Which NorthStar controller feature would be used in this scenario?

  • A . Maintenance mode
  • B . Shared risk link groups
  • C . Node diversity
  • D . Path diversity

Reveal Solution Hide Solution

Correct Answer: D
Question #23

You are the administrator of an MPLS WAN intermittent WAN hardware failure are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements.

Which Juniper Networks solution would be used to analyze this problem?

  • A . Network director
  • B . Contrail
  • C . NorthStar Planner
  • D . AppFormix

Reveal Solution Hide Solution

Correct Answer: C
Question #24

You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second.

Which product accomplishes this task?

  • A . NFX
  • B . MX
  • C . cSRX
  • D . vSRX

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Which mechanism allows tenants to interconnect across an overly network?

  • A . EBGP connections
  • B . P2P OSPF adjacencies
  • C . Subnets
  • D . Tunnels

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which two protocols provide loop prevention in an underlay network? (Choose two)

  • A . OSPF
  • B . VPLS
  • C . MSTP
  • D . EVPN

Reveal Solution Hide Solution

Correct Answer: A, C
Question #27

Which statements are correct about the NFV framework? (Choose two)

  • A . A spine and leaf implementation is an example of the NFV framework
  • B . The NFV framework is defined by ANSI
  • C . The NFV framework is defined by ETSI
  • D . The NFV Framework enables horizontally scalable deployments of services

Reveal Solution Hide Solution

Correct Answer: C, D
Question #28

Devices in your data center have become unwilling participants of botnet attacks. In this scenario.

Which security technology should you use to stop this behavior?

  • A . IPsec
  • B . Policy enforcer
  • C . Sky ATP C&C threat protection
  • D . Sky ATP GeoIP threat protection

Reveal Solution Hide Solution

Correct Answer: C
Question #29

You want to automate the management of virtualized applications using contrail networking.

Which type of SDN is used in this scenario?

  • A . API SDN
  • B . OpenFlow SDN
  • C . Ansible automation
  • D . Overly SDN

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Which protocol is used by the NorthStar controller to discover existing tunnels in a service provider or large enterprise WAN?

  • A . SNMP
  • B . REST
  • C . PCEP
  • D . NETCONF

Reveal Solution Hide Solution

Correct Answer: C, D

Question #31

What are two characteristics of policy Enforcer? (Choose two)

  • A . Policy Enforcer has its own standalone GUI
  • B . Policy Enforcer is integrated with security director
  • C . Policy Enforcer provides telemetry data for a collector device
  • D . Policy Enforcer consolidates threat information from multiple sources

Reveal Solution Hide Solution

Correct Answer: B, D
Question #32

Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)

  • A . Telemetry data is exported from the control plane
  • B . Additional software must be installed on the Junos device
  • C . Telemetry data is exported from the data plane
  • D . No additional software must be installed on the Junos device

Reveal Solution Hide Solution

Correct Answer: B, C
Question #33

You need to control and steer application traffic while maintaining an end-to-end view of the WAN and LAN.

Which juniper cloud product will satisfy the requirements in the scenario?

  • A . SKY ATP
  • B . Contrail cloud
  • C . Sky enterprise
  • D . Contrail service orchestration

Reveal Solution Hide Solution

Correct Answer: B
Question #34

Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)

  • A . TFTP
  • B . PCEP
  • C . NETCONF
  • D . HTTPS

Reveal Solution Hide Solution

Correct Answer: B, C
Question #35

What are two reason to use a vMX over a physical MX series in your deployment? (Choose two)

  • A . A vMX provides more routing features
  • B . A vMX has a lower barrier of entry
  • C . A vMX accelerates adding new services
  • D . A vMX increases analytic capabilities

Reveal Solution Hide Solution

Correct Answer: B, C
Exit mobile version