Exam4Training

Juniper JN0-212 Cloud-Associate (JNCIA-Cloud) Online Training

Question #1

A customer wants to provide advanced Layer 4 through Layer 7 security services for a VMware NSX microsegementation deployment.

Which platform would you recommend using in this scenario?

  • A . ACX Series
  • B . vMX Series
  • C . vSRX Series
  • D . QFX Series

Reveal Solution Hide Solution

Correct Answer: C
Question #2

Which statement is true about the OpenConfig data model?

  • A . It supports YANG
  • B . It provides UDP-based transport
  • C . It is embedded in all devices that run the Junos OS
  • D . It uses MySQL as the default database structure

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

  • A . service orchestration
  • B . infrastructure orchestration
  • C . physic a telco cloud infrastructure
  • D . virtual network functions

Reveal Solution Hide Solution

Correct Answer: A
Question #4

According to the juniper network, what is the recommended external routing protocol for the underlay network?

  • A . IS-IS
  • B . EGP
  • C . OSPF
  • D . BGP

Reveal Solution Hide Solution

Correct Answer: D
Question #5

What are two characteristics of Policy Enforcer? (Choose two)

  • A . Policy Enforcer has its own standalone GUI
  • B . Policy Enforcer consolidated threat information from multiple sources
  • C . Policy Enforcer provides telemetry data for a collector device
  • D . Policy Enforcer is integrated with Security Director

Reveal Solution Hide Solution

Correct Answer: B,D
Question #6

Which statement is true about Junos Space security director?

  • A . Security director is a standalone management platform
  • B . Security director is a centralized security policy manager
  • C . Security director is an SDN controller
  • D . Security director is a network orchestrator

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Which two statements are correct about the NFV framework? (Choose two)

  • A . The NFV framework is defined by ANSI
  • B . The NFV framework is defined by ETSI
  • C . The NFV framework enables horizontally scalable deployments of services
  • D . A spine and leaf implementation is an example of the NFV framework

Reveal Solution Hide Solution

Correct Answer: B,C
Question #8

AppFormix alarm notification are sent to an HTTP server using which format?

  • A . plain text
  • B . XML
  • C . CSV
  • D . JSON

Reveal Solution Hide Solution

Correct Answer: D
Question #9

Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)

  • A . MC-LAG
  • B . BGPC. LACP
  • C . TRILL

Reveal Solution Hide Solution

Correct Answer: A,C
Question #10

Which CSO component enables ISPs to set up and manage the virtual network and customers?

  • A . Service and Infrastructure Monitor
  • B . Designer Tools
  • C . Administration Portal
  • D . Customer Portal

Reveal Solution Hide Solution

Correct Answer: C

Question #11

From where does AppFormix gather performance metrics in a network?

  • A . from RPM probes sent across the network
  • B . from statistics NFVs instantiated in the data path
  • C . from an agent on the host or system
  • D . from a REST API connection

Reveal Solution Hide Solution

Correct Answer: C
Question #12

A company requests increased bandwidth during two specific periods each year.

Which solution will accomplish the desired result?

  • A . NorthStar planner
  • B . NorthStar bandwidth calendaring
  • C . NorthStar maintenance Mode
  • D . Centralized Path computation

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which statement describes AppFormix?

  • A . AppFormix is a high-performance virtual device that secures virtualized and cloud environments
  • B . AppFormix is the SDN automation platform for OpenStack Iaas
  • C . AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
  • D . AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments

Reveal Solution Hide Solution

Correct Answer: C
Question #14

What are two roles of sandboxing in Sky ATP? (choose two)

  • A . To test the operation of security rules
  • B . To analyze the behavior of potential security threats
  • C . To validate the operation of third-party components
  • D . To store infected files for further analysis

Reveal Solution Hide Solution

Correct Answer: B,D
Question #15

What provisions new switches or routers in your network automatically, with no manual intervention?

  • A . PCEP
  • B . ZTP
  • C . BGP
  • D . RSVP

Reveal Solution Hide Solution

Correct Answer: B
Question #16

What are two characteristics of cloud computing? (Choose two.)

  • A . Services are provisioned using automation.
  • B . Services are provisioned by the customer

Reveal Solution Hide Solution

Correct Answer: A,B
Question #17

Which cloud architecture provides developers a framework on which to develop and customize applications?

  • A . DBaaS
  • B . PaaS
  • C . IaaS
  • D . FWaaS

Reveal Solution Hide Solution

Correct Answer: B
Question #18

What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)

  • A . SNMP
  • B . OSPF-TE
  • C . NETCONF
  • D . BGP-LS

Reveal Solution Hide Solution

Correct Answer: B,D
Question #19

What are two Microservices provided by contrail services orchestration? (Choose two)

  • A . REST API server
  • B . Fabric Manager
  • C . VIM director
  • D . Security director

Reveal Solution Hide Solution

Correct Answer: B,D
Question #20

Which mechanism allows tenants to interconnect across an overlay network?

  • A . tunnels
  • B . subnets
  • C . EBGP connections
  • D . P2P OSPF adjacencies

Reveal Solution Hide Solution

Correct Answer: A

Question #21

Your company has three connections consisting of MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links.

Which product will facilitate this requirement?

  • A . Contrail SD-WAN
  • B . Contrail Cloud
  • C . Contrail networking
  • D . Contrail SD-LAN

Reveal Solution Hide Solution

Correct Answer: A
Question #22

Which statement is correct about alarms in AppFormix?

  • A . Static alarm are compared against fixed thresholds
  • B . Alarm thresholds cannot be changed by the user
  • C . Alarm actions cannot be change by the user
  • D . Static alarms are compared against historical data

Reveal Solution Hide Solution

Correct Answer: A
Question #23

What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (choose two)

  • A . Performance
  • B . Basic
  • C . Lite
  • D . Enhanced

Reveal Solution Hide Solution

Correct Answer: A,C
Question #24

Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution?

  • A . Administration Portal
  • B . AppFormix
  • C . Designer Tools
  • D . Customer Portal
  • E . Service and Infrastructure Monitor

Reveal Solution Hide Solution

Correct Answer: E
Question #25

Which two statements describe cloud CPE? (Choose two.)

  • A . Cloud CPE require heavy investment in vendor-specific hardware
  • B . Cloud CPE encourages administrators to use all-in-one appliances
  • C . Cloud CPE allows multivendor, open support of software-based functions
  • D . Cloud CPE eliminates the need for investing in expensive hardware

Reveal Solution Hide Solution

Correct Answer: B,D
Question #26

What is used to provide secure access to a vSRX in a public cloud?

  • A . authorized key pairs
  • B . SSH key pairs
  • C . private key pairs
  • D . public key pairs

Reveal Solution Hide Solution

Correct Answer: B
Question #27

Which statement is true regarding an OpenFlow controller-based software defined network?

  • A . The forwarding plane of each device in the network is programmed by the controller
  • B . The control plane of each device in the network is instantiated by the controller
  • C . The SDN controller pushes configuration files to each device in the network using RESTful APIs
  • D . The forwarding plane of each device in the network is managed by the device

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Which statement about contrail is true?

  • A . The contrail controller places a vRouter each virtual host in the network
  • B . The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances
  • C . The contrail virtual router segments virtual machines on physical hosts into different security zones
  • D . The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network

Reveal Solution Hide Solution

Correct Answer: A,B
Question #29

Which statement is true regarding Layer 3 underlay fabric networks?

  • A . Layer 3 underlay fabric networks can only be used across public networks
  • B . Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
  • C . Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
  • D . Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks

Reveal Solution Hide Solution

Correct Answer: D
Question #30

What operates below the virtualization layer in an NFV system?

  • A . The NFV management and orchestration components
  • B . the virtualized network functions (VNFs)
  • C . the compute, storage, and network hardware
  • D . the OSS and BSS management systems

Reveal Solution Hide Solution

Correct Answer: C

Question #31

Which two features does the Junos Telemetry interface (JTI) support? (Choose two).

  • A . JTI provides real-time telemetry.
  • B . JTI does not need a collector to store data
  • C . JTI requires no configuration
  • D . JTI can stream in multiple data models

Reveal Solution Hide Solution

Correct Answer: A,D
Question #32

What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)

  • A . A vMX provides more routing features.
  • B . A vMX accelerates adding new services
  • C . A vMX has a lower barrier of entry
  • D . A vMX increases analytic capabilities

Reveal Solution Hide Solution

Correct Answer: B,C
B,C

Explanation:

https://www.juniper.net/documentation/en_US/vmx/topics/concept/vmx-overview.html

Question #33

In which two scenarios is Contrail used? (Choose two.)

  • A . private cloud networking
  • B . network hardware lifecycle management
  • C . Network Functions Virtualization
  • D . policy-based routing

Reveal Solution Hide Solution

Correct Answer: A,C
Question #34

Which statement is correct about SDN?

  • A . The SDN controller has a centralized view of the network
  • B . The SDN controller must provide a manual method for configuration
  • C . SDN simplifies the network by combining the control and forwarding planes into a single controller
  • D . The configuration and management of an SDN solution should be distributed to the edge of the network

Reveal Solution Hide Solution

Correct Answer: A
Question #35

You want to prevent a single point of failure in your underlay network.

Which two protocols would be used to accomplish this task? (choose two)

  • A . LACP
  • B . VSTP
  • C . MC-LAG
  • D . RSTP

Reveal Solution Hide Solution

Correct Answer: A,C
Question #36

What are three orchestrators that integrate with Contrail? (Choose three)

  • A . VirtualBox
  • B . Kubernetes
  • C . Ubuntu
  • D . OpenStack
  • E . vSphere

Reveal Solution Hide Solution

Correct Answer: B,D,E
Question #37

Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)

  • A . TFTP
  • B . PCEP
  • C . NETCONF
  • D . HTTPS

Reveal Solution Hide Solution

Correct Answer: B,C
Question #38

Which two statements are true regarding private cloud services? (Choose two.)

  • A . A private cloud must apply encryption to all stored data
  • B . A private cloud has dedicated resources for individual customers
  • C . A private cloud can be deployed in a service provider network
  • D . A private cloud cannot connect to a public cloud

Reveal Solution Hide Solution

Correct Answer: B,C
Question #39

You are required to set up zero-day malware dedication for your private cloud without sending files off site for analysis.

What will accomplish this task?

  • A . JATP
  • B . IDP
  • C . UTM
  • D . Sky ATP

Reveal Solution Hide Solution

Correct Answer: D
Question #40

What information does an underlay network use to route data?

  • A . Application name
  • B . Customer ID
  • C . IP address
  • D . Customer name

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version