Exam JN0-211: IT Certification Guaranteed, The Easy Way!

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

IT Certification Guaranteed, The Easy Way!

Exam : JN0-211

Title : Cloud, Associate (JNCIA-Cloud)

Vendor : Juniper

Version : V12.75

1
IT Certification Guaranteed, The Easy Way!

NO.1 Which two components are part of the AppFormix architecture? (Choose two)
A. Policy controller
B. Compute node
C. SDN controller
D. Data platform
Answer: A,D

NO.2 What are two major components of the NorthStar Controller system? (Choose two.)
A. PCE
B. PCC
C. CE
D. vPE
Answer: A,B

NO.3 What are two goals of cloud security automation?(Choose two)


*******************************
A. to centrally manage security policies
B. to transition all security functions to cloud platforms
C. to automate responses to detected security threats
D. to implement all security functions in hardware
Answer: A,C

NO.4 Which two protocols would be used by the NorthStar controller to provision tunnels on an
edge router? (choose two)
A. TFTP
B. PCEP
C. NETCONF
D. HTTPS
Answer: B,C

NO.5 Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
Answer: A,D

NO.6 Devices in your data center have become unwilling participants of botnet attacks.
In this scenario, which security technology should you use to stop this behavior?
A. Policy Enhancer
B. Sky ATP GeoIP threat protection
C. Sky ATP C&C threat protection
D. IPsec

2
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.7 Which node in a Contrail cluster is used to collect data from the routers?
A. control node
B. analytics node
C. compute node
D. configuration node
Answer: B

NO.8 You are responsible for optimizing a global MPLS WAN. You must determine the optimal MPLS
forwarding paths and automate the provisioning of the forwarding paths into the network Which
Juniper Networks SDN solution will satisfy the requirements?
A. NorthStar Controller
B. Policy Enforcer
C. Contrail
D. Network Director
Answer: A

NO.9 What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
Answer: A,D,E

NO.10 Which cloud architecture provides developers a framework on which to develop and
customize applications?
A. DBaaS
B. PaaS
C. IaaS
D. FWaaS
Answer: B

NO.11 Which statement is true regarding an OpenFlow controller-based software defined network?
**********************
A. The forwarding plane of each device in the network is programmed by the controller
B. The control plane of each device in the network is instantiated by the controller
C. The SDN controller pushes configuration files to each device in the network using RESTful APIs
D. The forwarding plane of each device in the network is managed by the device
Answer: A

NO.12 In which two scenarios is Contrail used? (Choose two.)

3
IT Certification Guaranteed, The Easy Way!

A. private cloud networking


B. network hardware lifecycle management
C. Network Functions Virtualization
D. policy-based routing
Answer: A,C

NO.13 From where does AppFormix gather performance metrics in a network?


A. from RPM probes sent across the network
B. from statistics NFVs instantiated in the data path
C. from an agent on the host or system
D. from a REST API connection
Answer: C

NO.14 You are deploying a vMX device in your network


Which two virtualized components are required in this scenario?
A. virtual forwarding plane
B. virtual chassis port
C. virtual chassis fabric
D. virtual control plane
Answer: A,D

NO.15 What are two objectives of SDN?(choose two)


A. centralization of control plane
B. physical separation of the control plane from the data plane
C. centralization of the forwarding plane
D. centralization of the services plane
Answer: A,B

NO.16 What is an advantage of the Junos Telemetry Interface(JTI) over SNMP?


A. JTI can pull data more frequently
B. JTI always transfers data over HTTP
C. JTI never transfers data over UDP
D. JTI can push data more frequently
Answer: D

NO.17 You want to secure sensitive data and detect malware in your network.
Which component would be used to satisfy this requirement?
A. AppFormix
B. Sky ATP
C. Network director
D. Contrail cloud
Answer: C

4
IT Certification Guaranteed, The Easy Way!

NO.18 What are two technologies that a vMX's control plane uses to communicate with the
forwarding plane on the same servers?(Choose two.) ****
A. 802.1Q
B. Virtio
C. SR-IOV
D. OVSDB
Answer: B,C

NO.19 Which mechanism allows tenants to interconnect across an overlay network?


A. tunnels
B. subnets
C. EBGP connections
D. P2P OSPF adjacencies
Answer: A

NO.20 Which two benefits does the Junos Telemetry Interface(JTI) provide in an AppFormix
architecture?(Choose two.)
A. JTI enables you to deploy security policies to vSRX devices
B. JTI uses a push model to deliver data asynchronously
C. JTI enables you to collect and export data from resources such as
firewall filters
D. JTI uses an SNMP pull model to eliminate additional processing
Answer: B,C

NO.21 A customer want to deploy a website that can scale as needed


Which type of services should the customer purchase in this scenario?
A. DBaaS
B. SaaS
C. BGPaaS
D. FWaaS
Answer: B

NO.22 Which statement is correct about alarms in AppFormix?


A. Static alarm are compared against fixed thresholds
B. Alarm thresholds cannot be changed by the user
C. Alarm actions cannot be change by the user
D. Static alarms are compared against historical data
Answer: A

NO.23 Which two statements are true about cSRX firewalls? (Choose two.)
A. The host OS can be different from the guest OS
B. The host OS and image OS must match
C. The cSRX does not use static CPU reservations

5
IT Certification Guaranteed, The Easy Way!

D. The cSRX uses static CPU reservations


Answer: A,D

NO.24 Which two statements are correct about the NFV framework?(Choose two)
A. The NFV framework is defined by ANSI
B. The NFV framework is defined by ETSI
C. The NFV framework enables horizontally scalable deployments of
services
D. A spine and leaf implementation is an example of the NFV framework
Answer: B,C

NO.25 Which two statements are true about virtualized platforms?(Choose two.)
A. The vSRX must have two vCPU dedicated to the vCP
B. The vMX used separate VMs to host the vCP and vFP
C. The vSRX must have one vCPU dedicated to the vCP
D. The vMX uses one VM to host the vCP and vFP
Answer: B,C

NO.26 Which two protocols are used in a Contrail system to exchange routing information? (Choose
two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
Answer: A,B

NO.27 Which protocol is used to transport monitoring data in Juniper's open and extensible data
model?
A. TCP
B. SNMP
C. SOAP
D. UDP
Answer: D

NO.28 Which Juniper product is used to remotely provision the NFX250 platform for Network
Functions Virtualization?
A. Contrail Service Orchestration
B. Contrail Security
C. Virtual Route Reflector
D. Junos Space Security Director
Answer: A

NO.29 Which interface is used by applications, orchestration system, and other types of business

6
IT Certification Guaranteed, The Easy Way!

systems to communicate with as SDN controller?


A. controller interface
B. northbound interface
C. east-west interface
D. southbound interface
Answer: B

NO.30 You are deploying a Layer 2 underlay network with 2,000 devices and hosts.
Which two statements are correct?
A. Network routing tables can become very large and unmanageable
B. RPF is used for loop prevention
C. The MAC tables can become very large and unmanageable
D. RSTP can be used for loop prevention
Answer: C,D

NO.31 Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron
Answer: C

NO.32 Which protocol used to communicate LSP and status information between NorthStar
controller and label edge routers?
A. PCEP
B. ICCP
C. OSPF
D. BGP
Answer: A

NO.33 Exhibit:

7
IT Certification Guaranteed, The Easy Way!

Which type of SDN is shown in the exhibit?


A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay
Answer: B

NO.34 What are two concepts of private cloud? (choose two)


A. Resources are dedicated to your organization
B. Resources are accessed through a private connection
C. Non-critical resources are located outside of your organization
D. Resources are not secured by firewalls
Answer: A,B

NO.35 Server-1 has an infection and is communicating with a command and


control server on the Internet. You want to ensure that the infection on Server-1 does not infect
Server-2?
Which two actions accomplish this task?(Choose two.)
A. Deploy Sky ATP with advanced anti-malware protection
B. Deploy Sky ATP with C&C protection
C. Deploy Policy Enhancer to isolate infected host
D. Deploy Sky ATP with GeoIP protection
Answer: A,B

NO.36 Which cloud CPE component manages the end-to-end path from the CPE to the central office
or to another CPE?

8
IT Certification Guaranteed, The Easy Way!

A. service orchestration
B. infrastructure orchestration
C. physica telco cloud infrastructure
D. virtual network functions
Answer: A

NO.37 Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
A. JTI provides real-time telemetry.
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models
Answer: A,D

NO.38 Which statement is correct about CSO?


A. CSO is a complete orchestration system and can replace OpenStack
B. CSO has a gateway component and can be used to connect data centers
C. CSO can be used to establish and monitor LSPs in a service provider network
D. CSO can be used to manage VNFs at service provider's customer site
Answer: D

NO.39 Which two statement describe virtual network functions (VNFs)? (Choose two)
A. VNFs are provided at a customer's site or telco cloud
B. VNFs represent the service that monitors and tracks whether the services are performing
according to design
C. VNFs represent the infrastructure the comprises the telco underlay network
D. VNFs can be deployed as a software function within a single x86 platform
Answer: A,C

NO.40 Which type of SDN are you using when you automate a Junos device using PyEZ and
NETCONF?
A. API-based SDN
B. SDN as an overlay
C. SDN as an underlay
D. OpenFlow-based SDN
Answer: A

NO.41 Which statement describes AppFormix?


A. AppFormix is a high-performance virtual device that secures virtualized and cloud environments
B. AppFormix is the SDN automation platform for OpenStack Iaas
C. AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
D. AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments
Answer: C

9
IT Certification Guaranteed, The Easy Way!

NO.42 Which statement is correct about overlay network?


A. An overlay network requires an OSPF areA.
B. An overlay network must have switches interconnected in a spine-
leaf implementation
C. An overlay network uses tunneling technologies
D. An overlay network requires the CLOS architecture
Answer: C

NO.43 AppFormix has been deployed in your data center using the Juniper Telemetry Interface(JTI)
native sensors. However, the underlay devices have not yet been set up to work with the JTI native
sensors.
Which action is required for the JTI native sensors to work properly?
A. Install the AppFormix network agent on the underlay devices
B. Enable NETCONF over SSH on the underlay devices
C. Enable SSH on the underlay devices
D. Enable GPB messaging on the underlay devices
Answer: D

NO.44 You are using the NorthStar Controller to manage your WAN. You are required to remove a
node from the network for maintenance purposes. You want to compute and provision alternate
forwarding paths so that traffic is re-touted around the node being taken offline for maintenance.
Which NorthStar Controller feature would be used in this scenario?
A. path diversity
B. maintenance mode
C. shared risk link groups
D. node diversity
Answer: B

NO.45 What are two characteristics of vMX series devices? (Choose two)
A. The vMX series uses carrier-grade routing optimized for the x86 environment
B. The vMX series requires a license for production environment
C. The vMX series uses a trio ASIC
D. The vMX series uses containerization technology for rapid service enablement
Answer: A,B

NO.46 You need to control and steer application traffic while maintaining an end-to-end view of the
WAN and LAN.
Which Juniper cloud product will satisfy the requirements in this scenario?
A. Sky ATP
B. Contrail Service Orchestration
C. Contrail Cloud
D. Sky Enterprise
Answer: C

10
IT Certification Guaranteed, The Easy Way!

NO.47 Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)
A. Azure Application Insights
B. Native Sensors
C. Amazon Kinesis
D. OpenConfig
Answer: B,D

NO.48 Which two platforms share the same automation scripts?(Choose two)
A. vMX Series
B. MX Series
C. Junos Space
D. Contrail
Answer: A,B

NO.49 Which product is used to perform capacity planning of MPLS WANs?


A. Contrail Cloud
B. NorthStar Planner
C. Cloud Service Orchestration
D. VMware NSX
Answer: B

NO.50 Which statement defines a public cloud?


A. The cloud infrastructure is a composition of two or more strict
cloud infrastructures
B. The cloud infrastructure is provisioned for exclusive use by a
specific community of consumers from organizations that have shared
concerns
C. The cloud infrastructure is provisioned for exclusive use by a
single organization comprising multiple consumers
D. The cloud infrastructure is provisioned for open use by the general
Public
Answer: D

NO.51 Which OpenStack service manage image storage?


A. Glance
B. Swift
C. Nova
D. Heat
Answer: A

NO.52 What provisions new switches or routers in your network automatically, with no manual
intervention?
A. PCEP

11
IT Certification Guaranteed, The Easy Way!

B. ZTP
C. BGP
D. RSVP
Answer: B

NO.53 Which two statements are correct when using the native sensors model for the Juniper
Telemetry Interface with AppFormix?(Choose two.)
A. Telemetry data is exported from the data plane
B. Additional software must be installed on the Juniper device
C. No additional software must be installed on the Juniper device
D. Telemetry data is exported from the control plane
Answer: A,C

NO.54 Which organization is responsible for defining cloud computing?


A. IEEE
B. ANSI
C. NIST
D. IANA
Answer: C

NO.55 You have 100 small branch offices around the world. You must use a single pane of glass to
monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum
errors, and ports with maximum packet loss In this scenario, which product would satisfy the
requirement?
A. Contrail SD-WAN
B. Contrail SD-LAN
C. Contrail Networking
D. Contrail Cloud
Answer: A

NO.56 You need to find a product that will allow for the deployment of security devices to a new
tenant edge network in less than one second Which product accomplishes this task?
A. MX
B. NFX
C. vSRX
D. cSRX
Answer: D

NO.57 Which protocol is used by the NorthStar Controller to discover existing tunnels in a service
provider or large enterprise WAN?
A. SNMP
B. PCEP
C. REST

12
IT Certification Guaranteed, The Easy Way!

D. NETCONF
Answer: B,D

NO.58 Exhibit:

Which type of the topology is shown in the exhibit?(picture)


A. EGP topology
B. spine-and-leaf topology
C. tree topology
D. hub-and-spoke topology
Answer: B

NO.59 A customer is planning a significant upgrade to their network that requires an increase in
bandwidth. They want to schedule the increase for a specific date and time.
Which feature within the NorthStar controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
Answer: C

NO.60 Which two hypervisors does the vMX support? (Choose two)
A. KVM
B. xen
C. ESXi
D. Hyper V
Answer: A,C

NO.61 AppFormix alarm notification are sent to an HTTP server using which format?
A. plain text

13
IT Certification Guaranteed, The Easy Way!

B. XML
C. CSV
D. JSON
Answer: D

NO.62 You are deploying a layer 3 underlay network with 10,000 devices and hosts.
Which two statements are correct in this scenario? (choose two.)
A. Loop prevention is provided by the routing protocol
B. Routing table can become very large
C. RSTP can be used for loop prevention
D. The MAC tables can become very large
Answer: A,B

NO.63 You are the administrator of an MPLS WAN. Intermittent WAN hardware failures are causing
customer traffic to route over newly computed forwarding paths that do not satisfy service level
agreements Which Juniper Networks solution would be used to analyze this problem?
*************************
A. Network Director
B. AppFormix
C. NorthStar Planner
D. Contrail
Answer: C

NO.64 Which juniper product provides insight into the underlay and overlay network at the same
time? *************
A. Security Director
B. AppFormix
C. Edge Services Director
D. Juniper Extension Toolkit
E. Contrail Analysitcs
Answer: B

NO.65 Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such
as STP, in an underlay network? (Choose two)
A. MC-LAG
B. BGP
C. LACP
D. TRILL
Answer: A,C

NO.66 What are two protocols used by NorthStar Controller to discover the network
topology?(Choose two) **************
A. SNMP

14
IT Certification Guaranteed, The Easy Way!

B. OSPF-TE
C. NETCONF
D. BGP-LS
Answer: B,D

NO.67 Which two statements are true about an SDN controller?(Choose two.)
A. An SDN controller automates repetitive tasks in a network
B. An SDN controller regulates traffic transmission rates in a network
C. An SDN controller centralizes control and configuration of a
network
D. An SDN controller stores and manages software mages
Answer: A,C

NO.68 What are two reasons to use a vMX over a physical MX Series devices in your deployment?
(Choose two)
A. A vMX provides more routing features.
B. A vMX accelerates adding new services
C. A vMX has a lower barrier of entry
D. A vMX increases analytic capabilities
Answer: B,C

NO.69 Which CSO component enables the monitoring of the CSO system to provide real-time data
about the Cloud CPE solution?
A. Administration Portal
B. AppFormix
C. Designer Tools
D. Customer Portal
E. Service and Infrastructure Monitor
Answer: E

NO.70 You are required to set up zero-day malware dedication for your private cloud without
sending files off site for analysis.
What will accomplish this task?
A. JATP
B. IDP
C. UTM
D. Sky ATP
Answer: D

NO.71 What are two Microservices provided by contrail services orchestration? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director

15
IT Certification Guaranteed, The Easy Way!

D. Security director
Answer: B,D

NO.72 You want to automate the management of virtualized applications using Contrail Networking
Which type of SDN is used in this scenario?
A. OpenFlow SDN
B. API SDN
C. Overlay SDN
D. Ansible Automation
Answer: B

NO.73 Which two statements are true regarding private cloud services? (Choose two.)
A. A private cloud must apply encryption to all stored data
B. A private cloud has dedicated resources for individual customers
C. A private cloud can be deployed in a service provider network
D. A private cloud cannot connect to a public cloud
Answer: B,C

NO.74 Which statement is true about the vSRX Series and VMware NSX integration?
A. The NSX Distributed Firewall provides a container based layer of protection.
B. VMware NSX provides advanced Layer 4 through Layer 7 security services.
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment.
D. The NSX Distributed Firewall users application identification.
Answer: C

NO.75 What are two characteristics of Policy Enforcer? (Choose two)


A. Policy Enforcer has its own standalone GUI
B. Policy Enforcer consolidated threat information from multiple
sources
C. Policy Enforcer provides telemetry data for a collector device
D. Policy Enforcer is integrated with Security Director
Answer: B,D

NO.76 Which two pricing models are available from AWS Marketplace for vSRX consumption?
(Choose two.)
A. pay as you go
B. bring your own license
C. based on the number of policies
D. annual subscription
Answer: B,C

NO.77 You must set up multiple collection points across your network to look for malware and rogue
SSH attempts.

16
IT Certification Guaranteed, The Easy Way!

What will allow you to accomplish this task?


A. AppFormix
B. NorthStar
C. networking
D. JATP
Answer: D

NO.78 Which type of service would allow you to provision five servers with Windows Server 2016
installed?
A. IaaS
B. PaaS
C. SaaS
D. FWaaS
Answer: B

NO.79 You want to prevent a single point of failure in your underlay network.
Which two protocols would be used to accomplish this task? (choose two)
A. LACP
B. VSTP
C. MC-LAG
D. RSTP
Answer: A,C

NO.80 You are using the Juniper connected security solution to protect your network from malware.
However, you noticed that malware files over 10 MB are not being analyzed. You need the capability
of analyzing files greater than 10MB.
Which two components would allow you to accomplish this task ? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
Answer: B,D

NO.81 Your company has three connections consisting of MPLS, Internet, and wireless connections,
respectively. You must separate traffic according to the type of application sending that traffic across
the three links.
Which product will facilitate this requirement?
A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN
Answer: A

17
IT Certification Guaranteed, The Easy Way!

NO.82 What are two characteristics of Juniper's Connected Security Solution?(Choose two.)
A. manual secure policy control
B. dynamic VPN connections
C. centralized management
D. enforcement everywhere on the network
Answer: C,D

NO.83 Which two statement are true about SDN WAN implementations? (Choose two)
A. SDN WAN uses VXLAN to connect POPs
B. SDN WAN uses data center orchestration platforms
C. SDN WAN uses a centralized a control plane
D. SDN WAN uses MPLS tunnels to connect POPs
Answer: C,D

NO.84 What are two characteristics of cloud computing? (Choose two.)


A. Services are provisioned using automation.
B. Services are provisioned by the customer
Answer: A,B

NO.85 Which statement is true about NFV containers?


A. NFV containers usually provide fewer functions than VM-based NFs
B. NFV containers require an underlying hypervisor for deployment
C. NFV containers take longer to instantiate than virtual machines
D. NFV containers require more memory and storage resources to deploy
Answer: A

NO.86 Which type of tunnels are provisioned by the NorthStar controller?


A. IPsec VPNs
B. VPLs
C. MPLS LSPs
D. GRE over UDP
Answer: C

NO.87 What are two characteristics of cloud computing?(Choose two.)


A. customer-owned equipment
B. measured service
C. resource pooling
D. unrestricted public access to all resources
Answer: B,C

NO.88 What is used to provide secure access to a vSRX in a public cloud?


A. authorized key pairs
B. SSH key pairs

18
IT Certification Guaranteed, The Easy Way!

C. private key pairs


D. public key pairs
Answer: B

NO.89 Which two Juniper devices are used as a CSO CPE devices(Choose two.)
A. SRX
B. NFX
C. QFX
D. MX
Answer: A,B

NO.90 What are two examples of SaaS?(Choose two) *****************


A. Amazon Web Services
B. SalesForce
C. Google Apps
D. IBM Cloud
Answer: A,B

NO.91 Which Juniper product provides insight into the underlay and overly network at the same
time?
A. Security director
B. Juniper extension Toolkit
C. Edge services director
D. Contrail Analytics
Answer: D

NO.92 Which Junos Space application integrates with both VMware vSphere and VMware NSX
solutions to automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director
Answer: C

NO.93 What are three orchestrators that integrate with Contrail? (Choose three)
A. VirtualBox
B. Kubernetes
C. Ubuntu
D. OpenStack
E. vSphere
Answer: B,D,E

NO.94 What are two different modes available for the vMX on KVM that are based on CPU and

19
IT Certification Guaranteed, The Easy Way!

memory availability? (choose two)


A. Performance
B. Basic
C. Lite
D. Enhanced
Answer: A,C

NO.95 Which statement is correct when deploying services inside containers?


A. Containers can always be deployed for free
B. Containers use fewer resources than VMs
C. Services have dedicated processor and memory resources on each
server
D. Service must not be deployed using the same operating system
Answer: B

NO.96 Which method does WANDL use to collect live network information?
A. FTP
B. SOAP
C. TFTP
D. SNMP
Answer: D

NO.97 A company requests increased bandwidth during two specific periods each year.
Which solution will accomplish the desired result?
A. NorthStar planner
B. NorthStar bandwidth calendaring
C. NorthStar maintenance Mode
D. Centralized Path computation
Answer: A

NO.98 What is a primary difference between NFV and VNF?


A. A VNF defines the network underlay tunnel methodology while NFV is firewall that inspects traffic
in the overlay network.
B. NFV is the framework that describes how a virtual function should operate while VNF is the virtual
function itself
C. A VNF operates on a bare metal server while NFV operates on a switch
D. NFV identifies the host on which the VNF operates.
Answer: B

NO.99 Which statement is true about VNFs?


A. VNFs are always physical devices
B. VNFs are virtual devices
C. VNFs are only used in service provider clouds

20
IT Certification Guaranteed, The Easy Way!

D. VNFs are only used in data centers


Answer: B

NO.100 Which statement is true about the OpenConfig data model?


A. It supports YANG
B. It provides UDP-based transport
C. It is embedded in all devices that run the Junos OS
D. It uses MySQL as the default database structure
Answer: A

NO.101 Which statement about contrail is true?


A. The contrail controller places a vRouter each virtual host in the network
B. The contrail virtual router segments virtual machines on physical hosts into virtual touting and
forwarding instances
C. The contrail virtual router segments virtual machines on physical hosts into different security
zones
D. The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the
network
Answer: A,B

NO.102 You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an
Internet circuit as long as it satisfies the SLA requirements.
In this scenario, what would you use to accomplish this task?
A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN
Answer: B

NO.103 A customer wants to provide advanced Layer 4 through Layer 7 security services for a
VMware NSX microsegementation deployment.
Which platform would you recommend using in this scenario?
A. ACX Series
B. vMX Series
C. vSRX Series
D. QFX Series
Answer: C

NO.104 According to the juniper network, what is the recommended external routing protocol for
the underlay network?
A. IS-IS
B. EGP
C. OSPF

21
IT Certification Guaranteed, The Easy Way!

D. BGP
Answer: D

NO.105 Which statement is true regarding Layer 3 underlay fabric networks?


A. Layer 3 underlay fabric networks can only be used across public networks
B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
D. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks
Answer: D

NO.106 Which two product are required when deploying vSRX as a partner security service in
VMware NSX? (Choose two)
A. VMware vROPs
B. VMware NSX manager
C. Junos Space Security Director
D. IDP sensor
Answer: B,C

NO.107 Which statement is true about Junos Space security director?


A. Security director is a standalone management platform
B. Security director is a centralized security policy manager
C. Security director is an SDN controller
D. Security director is a network orchestrator
Answer: B

NO.108 Which CSO component enables ISPs to set up and manage the virtual network and
customers? **************
A. Service and Infrastructure Monitor
B. Designer Tools
C. Administration Portal
D. Customer Portal
Answer: C

NO.109 What are two roles of sandboxing in Sky ATP? (choose two)
A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis
Answer: B,D

NO.110 What information does an underlay network use to route data?


A. Application name
B. Customer ID

22
IT Certification Guaranteed, The Easy Way!

C. IP address
D. Customer name
Answer: C

NO.111 You must create a security policy that works cross your multicloud, Kubernetes, and
OpenStack deployments.
Which product will accomplish this task?
A. Contrail Security
B. Policy Enforcer
C. Sky ATP
D. Juniper ATP
Answer: D

NO.112 Which message type is supported by the Junos Telemetry interface?


A. GPB
B. OpenShift
C. JET
D. YANG
Answer: A

NO.113 Which statement is correct about SDN?


A. The SDN controller has a centralized view of the network
B. The SDN controller must provide a manual method for configuration
C. SDN simplifies the network by combining the control and forwarding
planes into a single controller
D. The configuration and management of an SDN solution should be
distributed to the edge of the network
Answer: A

NO.114 You want to secure sensitive data and detect malware in your network.
Which component would be used to satisfy this requirement?
A. Contrail cloud
B. Network director
C. AppFormix
D. Sky ATP
Answer: B

NO.115 You are using service chains.


In this scenario, which component launches the NFV VM?
A. vRouter
B. NorthStar Controller
C. compute node
D. orchestrator

23
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.116 Which type of API does contrail service orchestration provide when connecting with OSS
and BSS applications?
A. TLS
B. REST
C. XMPP
D. SOAP
Answer: B

NO.117 Which open source management framework does VMware NSX use to manage VXLANs on
Junos device?
A. OVSDB
B. Contrail networking
C. OpenFlow
D. OpenConfig
Answer: A

NO.118 Which two statements describe cloud CPE?(Choose two.)


A. Cloud CPE require heavy investment in vendor-specific hardware
B. Cloud CPE encourages administrators to use all-in-one appliances
C. Cloud CPE allows multivendor, open support of software-based
functions
D. Cloud CPE eliminates the need for investing in expensive hardware
Answer: B,D

NO.119 What are two examples of public cloud providers? (Choose two.)
A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services
Answer: C,D

NO.120 Which two capabilities are supported with the cSRX firewall?(choose two)
A. IPS
B. routing instances
C. chassis clustering
D. Layer 2 deployment
Answer: A,B

24

You might also like