Exam4Training

Juniper JN0-213 Cloud, Associate (JNCIA-Cloud) Online Training

Question #1

Which virtualization technique is used by containers?

  • A . OS-level virtualization
  • B . full visualization
  • C . hardware-assisted virtualization
  • D . paravirtualization

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

This technique allows multiple isolated user-space instances to be created by the host operating system. Unlike full virtualization, where the entire system’s hardware is emulated, OS-level virtualization shares the host’s operating system kernel but isolates the application processes12.

Question #2

Which two statements are true regarding isolated namespaces in Juniper Cloud-Native Contrail Networking (CN2)? (Choose two.)

  • A . Pods in isolated namespaces can only communicate with pods in the same namespace.
  • B . Pods in isolated namespaces can reach services in non-isolated namespaces.
  • C . Pods in isolated namespaces can only reach services in the same namespace.
  • D . Pods in isolated namespaces can communicate with pods in non-isolated namespaces.

Reveal Solution Hide Solution

Correct Answer: A, C
A, C

Explanation:

In Juniper Cloud-Native Contrail Networking (CN2), isolated namespaces are used to isolate a pod from other pods without explicitly configuring a network policy3. Pods in an isolated namespace can only communicate with pods in the same namespace3. They cannot reach pods or services in other isolated or non-isolated namespaces3.

Question #3

You must provide tunneling in the overlay that supports multipath capabilities.

Which two protocols provide this function? (Choose two.)

  • A . MPLSoUDP
  • B . VPN
  • C . VXLAN
  • D . MPLSoGRE

Reveal Solution Hide Solution

Correct Answer: A, C
A, C

Explanation:

MPLSoUDP (Multiprotocol Label Switching over User Datagram Protocol) and VXLAN (Virtual Extensible LAN) are two protocols that provide tunneling in the overlay and support multipath capabilities45. MPLSoUDP is an encapsulation protocol that allows MPLS packets to be encapsulated in UDP packets. VXLAN is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments

Question #4

You want to limit the memory, CPU, and network utilization of a set of processes running on a Linux host.

Which Linux feature would you configure in this scenario?

  • A . network namespaces
  • B . slicing
  • C . virtual routing and forwarding instances
  • D . control groups

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Control groups (cgroups) is a Linux kernel feature that limits, accounts for, and isolates the CPU, memory, disk I/O, and network usage of one or more processes678. It allows you to allocate resources among user-defined groups of processes running on a system. You can monitor the groups of processes, deny the groups of processes access to certain resources, or even freeze groups of processes

Question #5

Which component of Kubernetes runs on all nodes and ensures that the containers are running in a pod?

  • A . kube-proxy
  • B . kubelel
  • C . container runtime
  • D . kube controller

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The kubelet is a component of Kubernetes that runs on all nodes in the cluster and ensures that containers are running in a pod910. It takes a set of PodSpecs that are provided through various mechanisms and ensures that the containers described in those PodSpecs are running and healthy

Question #6

Which two statements are correct about containers? (Choose two.)

  • A . Containers include the entire operating system.
  • B . Containers reduce deployment efficiency.
  • C . Containers have faster boot times than VMs. www*
  • D . Containers require an underlying operating system.

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

Containers are lightweight because they don’t need the extra load of a hypervisor, but run directly within the host machine’s kernel1. This means they start up almost instantly and use less RAM. Images are constructed from layered filesystems and share common files, making disk usage and image downloads much more efficient1. Containers are isolated from each other and the host system. They have their own filesystem and networking, and can be constrained to not allow root access outside the container1. They run on top of a host operating system1.

Question #7

What are two Kubernetes objects? (Choose two.)

  • A . cluster
  • B . namespace
  • C . pod
  • D . service

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

In Kubernetes, a Pod is the smallest and simplest unit in the Kubernetes object model that you create or deploy23. A Pod represents processes running on your cluster23. A Service in Kubernetes is an abstraction which defines a logical set of Pods and a policy by which to access them23.

Question #8

Which two statements are correct about an overlay network? (Choose two.)

  • A . The overlay network can only be built using a Layer 3 underlay network.
  • B . The overlay network provides physical connectivity between devices.
  • C . The overlay network is built using encapsulation tunnels.
  • D . The overlay network is the virtual network used to connect multiple virtual machines (VMs).

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

An overlay network is a virtual network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network45. For example, distributed systems such as peer-to-peer networks and client-server applications often overlay their own network connections over the physical network connections provided by the Internet

Question #9

Your company has a Web app hosted in Kubernetes with a fluctuating number of pods.

In this scenario, which Kubernetes service type would provide equal access to all nodes using a single URL?

  • A . ExternalName
  • B . NodePort
  • C . LoadBalancer
  • D . ClusterIP

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The LoadBalancer service type in Kubernetes exposes the service externally using a cloud provider’s load balancer67. NodePort and ClusterIP services, to which the external load balancer routes, are automatically created

Question #10

Which two Linux commands would you use to show the amount of RAM in your system? (Choose

two.)

  • A . cat /proc/cpuinfo
  • B . free -h
  • C . cat /proc/meminto
  • D . df -h

Reveal Solution Hide Solution

Correct Answer: B, C
B, C

Explanation:

he free -h command in Linux displays the total amount of free and used physical and swap memory in the system, as well as the buffers used by the kernel89. The cat /proc/meminfo command displays real-time information about the system’s memory usage as well as the buffers and shared memory used by the kernel1

Question #11

Which statement is correct about overlay or underlay networks or fabrics?

  • A . Underlay fabrics decouple network services from the overlay infrastructure.
  • B . Overlay networks are Layer 3 networks that must use OSPF for routing purposes.
  • C . Underlay fabrics enable multitenancy through virtualization.
  • D . Overlay networks are virtual networks.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Overlay networks are indeed virtual networks. They are logical constructs that stitch together

disparate, dispersed network infrastructure, often referred to as underlay1. Underlay networks refer to the physical network infrastructure, while overlay networks implement network virtualization concepts2. Reference from Juniper site: Baeldung on Computer Science, PacketFabric, Cisco, HPE Aruba Networking

Question #12

Which two statements are correct about Kubernetes resources? (Choose two.)

  • A . A deploymentConfig is a Kubernetes resource.
  • B . A daemonSet ensures that a replica of a pod is running on all nodes.
  • C . A ClusterIP type service can only be accessed within a Kubernetes cluster.
  • D . NodePort service exposes the service externally by using a cloud provider load balancer.

Reveal Solution Hide Solution

Correct Answer: B, C
B, C

Explanation:

A daemonSet in Kubernetes ensures that a replica of a pod is running on all nodes3. A ClusterIP type service can only be accessed within a Kubernetes cluster3. Reference from Juniper site: Kubernetes Documentation

Question #13

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

  • A . The c using a custom flavor.
  • B . The myvSRX instance is part of a default network.
  • C . The myvSRX instance is using a default image.
  • D . The myvSRX instance is currently running.

Reveal Solution Hide Solution

Correct Answer: A, D
A, D

Explanation:

Based on the image description provided, the instance named ‘myvSRX’ appears to be using a custom flavor (not default) and is currently in an ‘ACTIVE’ state, which means it is running.

Question #14

Which two statements are true about VRF instances? (Choose two.)

  • A . VRFs share a single routing table.
  • B . VRFs do not enable overlapping IP addresses within the same cloud network.
  • C . VRFs enable overlapping IP addresses within the same cloud network.
  • D . Each VRF has its own routing table.

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

Virtual Routing and Forwarding (VRF) is a technology that allows multiple instances of a routing table to coexist within the same router at the same time. Because the routing instances are independent, overlapping IP addresses can be used without conflict45. Each VRF has its own routing table4. Reference from Juniper site: Wikipedia, Cisco

Question #15

Which CN2 component provides the network control plane capability?

  • A . contrail-k8s-kubemanaqer
  • B . contrail-vrouter-nodes
  • C . contrail-control
  • D . contrail-k8s-controller

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The network control plane in CN2 represents CN2’s full-featured SDN capability. It communicates with other controllers and uses XMPP to communicate with the distributed data plane components on the worker nodes6. Reference from Juniper site: Juniper Networks

Question #16

What are two characteristics of the OpenShift Assisted Installer? (Choose two.)

  • A . It uses one of the control plane nodes as a bootstrap node.
  • B . It does not support bare-metal deployments.
  • C . It offers REST APIs for the configuration and installation
  • D . It provides full feature support and customizations.

Reveal Solution Hide Solution

Correct Answer: A, C
A, C

Explanation:

The OpenShift Assisted Installer uses one of the control plane nodes as a bootstrap node12. It also offers REST APIs for the configuration and installation12.

Question #17

Which two tools are used to deploy a Kubernetes environment for testing and development purposes? (Choose two.)

  • A . oc
  • B . OpenStack
  • C . minikube
  • D . kind

Reveal Solution Hide Solution

Correct Answer: C, D
C, D

Explanation:

Minikube and kind are two tools that are commonly used to deploy a Kubernetes environment for testing and development purposes3

Question #18

Which two statements are true about virtual networks? (Choose two.)

  • A . Virtual networks are available only as part of a cloud orchestration system.
  • B . Virtual networks are able to span multiple devices.
  • C . Virtual networks are limited to a single device.
  • D . Virtual networks are available on common Linux distributions.

Reveal Solution Hide Solution

Correct Answer: B, D
B, D

Explanation:

Virtual networks are logical networks that are decoupled from the underlying network hardware. This decoupling allows network administrators to manage their networks independently of the physical network topology. As such, virtual networks can span multiple devices, allowing for a high degree of flexibility and scalability. Furthermore, virtual networks are available on common Linux distributions, allowing for easy deployment and management.

Question #19

Which term identifies to which network a virtual machine interface is connected?

  • A . Virtual Extensible LAN (VXLAN)
  • B . machine access control (MAC)
  • C . virtual tunnel endpoint (VTEP)
  • D . virtual network ID (VNID)

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The term that identifies to which network a virtual machine interface is connected is the virtual network ID (VNID). The VNID is a unique identifier assigned to each virtual network. It is used to differentiate between different virtual networks and to ensure that each virtual machine interface is connected to the correct network.

Question #20

Which Docker component builds, runs, and distributes Docker containers?

  • A . docker cli
  • B . containerd
  • C . dockerd
  • D . docker registry

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The Docker component that builds, runs, and distributes Docker containers is dockerd. Dockerd is the persistent process that manages containers. Docker uses different binaries for different tasks. For example, it uses the docker binary for CLI commands and dockerd for the daemon process.

Exit mobile version