Exam JN0-211: IT Certification Guaranteed, The Easy Way!
Exam JN0-211: IT Certification Guaranteed, The Easy Way!
Exam JN0-211: IT Certification Guaranteed, The Easy Way!
Exam : JN0-211
Vendor : Juniper
Version : V12.75
1
IT Certification Guaranteed, The Easy Way!
NO.1 Which two components are part of the AppFormix architecture? (Choose two)
A. Policy controller
B. Compute node
C. SDN controller
D. Data platform
Answer: A,D
NO.2 What are two major components of the NorthStar Controller system? (Choose two.)
A. PCE
B. PCC
C. CE
D. vPE
Answer: A,B
NO.4 Which two protocols would be used by the NorthStar controller to provision tunnels on an
edge router? (choose two)
A. TFTP
B. PCEP
C. NETCONF
D. HTTPS
Answer: B,C
NO.5 Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
Answer: A,D
NO.6 Devices in your data center have become unwilling participants of botnet attacks.
In this scenario, which security technology should you use to stop this behavior?
A. Policy Enhancer
B. Sky ATP GeoIP threat protection
C. Sky ATP C&C threat protection
D. IPsec
2
IT Certification Guaranteed, The Easy Way!
Answer: C
NO.7 Which node in a Contrail cluster is used to collect data from the routers?
A. control node
B. analytics node
C. compute node
D. configuration node
Answer: B
NO.8 You are responsible for optimizing a global MPLS WAN. You must determine the optimal MPLS
forwarding paths and automate the provisioning of the forwarding paths into the network Which
Juniper Networks SDN solution will satisfy the requirements?
A. NorthStar Controller
B. Policy Enforcer
C. Contrail
D. Network Director
Answer: A
NO.9 What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
Answer: A,D,E
NO.10 Which cloud architecture provides developers a framework on which to develop and
customize applications?
A. DBaaS
B. PaaS
C. IaaS
D. FWaaS
Answer: B
NO.11 Which statement is true regarding an OpenFlow controller-based software defined network?
**********************
A. The forwarding plane of each device in the network is programmed by the controller
B. The control plane of each device in the network is instantiated by the controller
C. The SDN controller pushes configuration files to each device in the network using RESTful APIs
D. The forwarding plane of each device in the network is managed by the device
Answer: A
3
IT Certification Guaranteed, The Easy Way!
NO.17 You want to secure sensitive data and detect malware in your network.
Which component would be used to satisfy this requirement?
A. AppFormix
B. Sky ATP
C. Network director
D. Contrail cloud
Answer: C
4
IT Certification Guaranteed, The Easy Way!
NO.18 What are two technologies that a vMX's control plane uses to communicate with the
forwarding plane on the same servers?(Choose two.) ****
A. 802.1Q
B. Virtio
C. SR-IOV
D. OVSDB
Answer: B,C
NO.20 Which two benefits does the Junos Telemetry Interface(JTI) provide in an AppFormix
architecture?(Choose two.)
A. JTI enables you to deploy security policies to vSRX devices
B. JTI uses a push model to deliver data asynchronously
C. JTI enables you to collect and export data from resources such as
firewall filters
D. JTI uses an SNMP pull model to eliminate additional processing
Answer: B,C
NO.23 Which two statements are true about cSRX firewalls? (Choose two.)
A. The host OS can be different from the guest OS
B. The host OS and image OS must match
C. The cSRX does not use static CPU reservations
5
IT Certification Guaranteed, The Easy Way!
NO.24 Which two statements are correct about the NFV framework?(Choose two)
A. The NFV framework is defined by ANSI
B. The NFV framework is defined by ETSI
C. The NFV framework enables horizontally scalable deployments of
services
D. A spine and leaf implementation is an example of the NFV framework
Answer: B,C
NO.25 Which two statements are true about virtualized platforms?(Choose two.)
A. The vSRX must have two vCPU dedicated to the vCP
B. The vMX used separate VMs to host the vCP and vFP
C. The vSRX must have one vCPU dedicated to the vCP
D. The vMX uses one VM to host the vCP and vFP
Answer: B,C
NO.26 Which two protocols are used in a Contrail system to exchange routing information? (Choose
two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
Answer: A,B
NO.27 Which protocol is used to transport monitoring data in Juniper's open and extensible data
model?
A. TCP
B. SNMP
C. SOAP
D. UDP
Answer: D
NO.28 Which Juniper product is used to remotely provision the NFX250 platform for Network
Functions Virtualization?
A. Contrail Service Orchestration
B. Contrail Security
C. Virtual Route Reflector
D. Junos Space Security Director
Answer: A
NO.29 Which interface is used by applications, orchestration system, and other types of business
6
IT Certification Guaranteed, The Easy Way!
NO.30 You are deploying a Layer 2 underlay network with 2,000 devices and hosts.
Which two statements are correct?
A. Network routing tables can become very large and unmanageable
B. RPF is used for loop prevention
C. The MAC tables can become very large and unmanageable
D. RSTP can be used for loop prevention
Answer: C,D
NO.31 Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron
Answer: C
NO.32 Which protocol used to communicate LSP and status information between NorthStar
controller and label edge routers?
A. PCEP
B. ICCP
C. OSPF
D. BGP
Answer: A
NO.33 Exhibit:
7
IT Certification Guaranteed, The Easy Way!
NO.36 Which cloud CPE component manages the end-to-end path from the CPE to the central office
or to another CPE?
8
IT Certification Guaranteed, The Easy Way!
A. service orchestration
B. infrastructure orchestration
C. physica telco cloud infrastructure
D. virtual network functions
Answer: A
NO.37 Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
A. JTI provides real-time telemetry.
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models
Answer: A,D
NO.39 Which two statement describe virtual network functions (VNFs)? (Choose two)
A. VNFs are provided at a customer's site or telco cloud
B. VNFs represent the service that monitors and tracks whether the services are performing
according to design
C. VNFs represent the infrastructure the comprises the telco underlay network
D. VNFs can be deployed as a software function within a single x86 platform
Answer: A,C
NO.40 Which type of SDN are you using when you automate a Junos device using PyEZ and
NETCONF?
A. API-based SDN
B. SDN as an overlay
C. SDN as an underlay
D. OpenFlow-based SDN
Answer: A
9
IT Certification Guaranteed, The Easy Way!
NO.43 AppFormix has been deployed in your data center using the Juniper Telemetry Interface(JTI)
native sensors. However, the underlay devices have not yet been set up to work with the JTI native
sensors.
Which action is required for the JTI native sensors to work properly?
A. Install the AppFormix network agent on the underlay devices
B. Enable NETCONF over SSH on the underlay devices
C. Enable SSH on the underlay devices
D. Enable GPB messaging on the underlay devices
Answer: D
NO.44 You are using the NorthStar Controller to manage your WAN. You are required to remove a
node from the network for maintenance purposes. You want to compute and provision alternate
forwarding paths so that traffic is re-touted around the node being taken offline for maintenance.
Which NorthStar Controller feature would be used in this scenario?
A. path diversity
B. maintenance mode
C. shared risk link groups
D. node diversity
Answer: B
NO.45 What are two characteristics of vMX series devices? (Choose two)
A. The vMX series uses carrier-grade routing optimized for the x86 environment
B. The vMX series requires a license for production environment
C. The vMX series uses a trio ASIC
D. The vMX series uses containerization technology for rapid service enablement
Answer: A,B
NO.46 You need to control and steer application traffic while maintaining an end-to-end view of the
WAN and LAN.
Which Juniper cloud product will satisfy the requirements in this scenario?
A. Sky ATP
B. Contrail Service Orchestration
C. Contrail Cloud
D. Sky Enterprise
Answer: C
10
IT Certification Guaranteed, The Easy Way!
NO.47 Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)
A. Azure Application Insights
B. Native Sensors
C. Amazon Kinesis
D. OpenConfig
Answer: B,D
NO.48 Which two platforms share the same automation scripts?(Choose two)
A. vMX Series
B. MX Series
C. Junos Space
D. Contrail
Answer: A,B
NO.52 What provisions new switches or routers in your network automatically, with no manual
intervention?
A. PCEP
11
IT Certification Guaranteed, The Easy Way!
B. ZTP
C. BGP
D. RSVP
Answer: B
NO.53 Which two statements are correct when using the native sensors model for the Juniper
Telemetry Interface with AppFormix?(Choose two.)
A. Telemetry data is exported from the data plane
B. Additional software must be installed on the Juniper device
C. No additional software must be installed on the Juniper device
D. Telemetry data is exported from the control plane
Answer: A,C
NO.55 You have 100 small branch offices around the world. You must use a single pane of glass to
monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum
errors, and ports with maximum packet loss In this scenario, which product would satisfy the
requirement?
A. Contrail SD-WAN
B. Contrail SD-LAN
C. Contrail Networking
D. Contrail Cloud
Answer: A
NO.56 You need to find a product that will allow for the deployment of security devices to a new
tenant edge network in less than one second Which product accomplishes this task?
A. MX
B. NFX
C. vSRX
D. cSRX
Answer: D
NO.57 Which protocol is used by the NorthStar Controller to discover existing tunnels in a service
provider or large enterprise WAN?
A. SNMP
B. PCEP
C. REST
12
IT Certification Guaranteed, The Easy Way!
D. NETCONF
Answer: B,D
NO.58 Exhibit:
NO.59 A customer is planning a significant upgrade to their network that requires an increase in
bandwidth. They want to schedule the increase for a specific date and time.
Which feature within the NorthStar controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
Answer: C
NO.60 Which two hypervisors does the vMX support? (Choose two)
A. KVM
B. xen
C. ESXi
D. Hyper V
Answer: A,C
NO.61 AppFormix alarm notification are sent to an HTTP server using which format?
A. plain text
13
IT Certification Guaranteed, The Easy Way!
B. XML
C. CSV
D. JSON
Answer: D
NO.62 You are deploying a layer 3 underlay network with 10,000 devices and hosts.
Which two statements are correct in this scenario? (choose two.)
A. Loop prevention is provided by the routing protocol
B. Routing table can become very large
C. RSTP can be used for loop prevention
D. The MAC tables can become very large
Answer: A,B
NO.63 You are the administrator of an MPLS WAN. Intermittent WAN hardware failures are causing
customer traffic to route over newly computed forwarding paths that do not satisfy service level
agreements Which Juniper Networks solution would be used to analyze this problem?
*************************
A. Network Director
B. AppFormix
C. NorthStar Planner
D. Contrail
Answer: C
NO.64 Which juniper product provides insight into the underlay and overlay network at the same
time? *************
A. Security Director
B. AppFormix
C. Edge Services Director
D. Juniper Extension Toolkit
E. Contrail Analysitcs
Answer: B
NO.65 Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such
as STP, in an underlay network? (Choose two)
A. MC-LAG
B. BGP
C. LACP
D. TRILL
Answer: A,C
NO.66 What are two protocols used by NorthStar Controller to discover the network
topology?(Choose two) **************
A. SNMP
14
IT Certification Guaranteed, The Easy Way!
B. OSPF-TE
C. NETCONF
D. BGP-LS
Answer: B,D
NO.67 Which two statements are true about an SDN controller?(Choose two.)
A. An SDN controller automates repetitive tasks in a network
B. An SDN controller regulates traffic transmission rates in a network
C. An SDN controller centralizes control and configuration of a
network
D. An SDN controller stores and manages software mages
Answer: A,C
NO.68 What are two reasons to use a vMX over a physical MX Series devices in your deployment?
(Choose two)
A. A vMX provides more routing features.
B. A vMX accelerates adding new services
C. A vMX has a lower barrier of entry
D. A vMX increases analytic capabilities
Answer: B,C
NO.69 Which CSO component enables the monitoring of the CSO system to provide real-time data
about the Cloud CPE solution?
A. Administration Portal
B. AppFormix
C. Designer Tools
D. Customer Portal
E. Service and Infrastructure Monitor
Answer: E
NO.70 You are required to set up zero-day malware dedication for your private cloud without
sending files off site for analysis.
What will accomplish this task?
A. JATP
B. IDP
C. UTM
D. Sky ATP
Answer: D
NO.71 What are two Microservices provided by contrail services orchestration? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
15
IT Certification Guaranteed, The Easy Way!
D. Security director
Answer: B,D
NO.72 You want to automate the management of virtualized applications using Contrail Networking
Which type of SDN is used in this scenario?
A. OpenFlow SDN
B. API SDN
C. Overlay SDN
D. Ansible Automation
Answer: B
NO.73 Which two statements are true regarding private cloud services? (Choose two.)
A. A private cloud must apply encryption to all stored data
B. A private cloud has dedicated resources for individual customers
C. A private cloud can be deployed in a service provider network
D. A private cloud cannot connect to a public cloud
Answer: B,C
NO.74 Which statement is true about the vSRX Series and VMware NSX integration?
A. The NSX Distributed Firewall provides a container based layer of protection.
B. VMware NSX provides advanced Layer 4 through Layer 7 security services.
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment.
D. The NSX Distributed Firewall users application identification.
Answer: C
NO.76 Which two pricing models are available from AWS Marketplace for vSRX consumption?
(Choose two.)
A. pay as you go
B. bring your own license
C. based on the number of policies
D. annual subscription
Answer: B,C
NO.77 You must set up multiple collection points across your network to look for malware and rogue
SSH attempts.
16
IT Certification Guaranteed, The Easy Way!
NO.78 Which type of service would allow you to provision five servers with Windows Server 2016
installed?
A. IaaS
B. PaaS
C. SaaS
D. FWaaS
Answer: B
NO.79 You want to prevent a single point of failure in your underlay network.
Which two protocols would be used to accomplish this task? (choose two)
A. LACP
B. VSTP
C. MC-LAG
D. RSTP
Answer: A,C
NO.80 You are using the Juniper connected security solution to protect your network from malware.
However, you noticed that malware files over 10 MB are not being analyzed. You need the capability
of analyzing files greater than 10MB.
Which two components would allow you to accomplish this task ? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
Answer: B,D
NO.81 Your company has three connections consisting of MPLS, Internet, and wireless connections,
respectively. You must separate traffic according to the type of application sending that traffic across
the three links.
Which product will facilitate this requirement?
A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN
Answer: A
17
IT Certification Guaranteed, The Easy Way!
NO.82 What are two characteristics of Juniper's Connected Security Solution?(Choose two.)
A. manual secure policy control
B. dynamic VPN connections
C. centralized management
D. enforcement everywhere on the network
Answer: C,D
NO.83 Which two statement are true about SDN WAN implementations? (Choose two)
A. SDN WAN uses VXLAN to connect POPs
B. SDN WAN uses data center orchestration platforms
C. SDN WAN uses a centralized a control plane
D. SDN WAN uses MPLS tunnels to connect POPs
Answer: C,D
18
IT Certification Guaranteed, The Easy Way!
NO.89 Which two Juniper devices are used as a CSO CPE devices(Choose two.)
A. SRX
B. NFX
C. QFX
D. MX
Answer: A,B
NO.91 Which Juniper product provides insight into the underlay and overly network at the same
time?
A. Security director
B. Juniper extension Toolkit
C. Edge services director
D. Contrail Analytics
Answer: D
NO.92 Which Junos Space application integrates with both VMware vSphere and VMware NSX
solutions to automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director
Answer: C
NO.93 What are three orchestrators that integrate with Contrail? (Choose three)
A. VirtualBox
B. Kubernetes
C. Ubuntu
D. OpenStack
E. vSphere
Answer: B,D,E
NO.94 What are two different modes available for the vMX on KVM that are based on CPU and
19
IT Certification Guaranteed, The Easy Way!
NO.96 Which method does WANDL use to collect live network information?
A. FTP
B. SOAP
C. TFTP
D. SNMP
Answer: D
NO.97 A company requests increased bandwidth during two specific periods each year.
Which solution will accomplish the desired result?
A. NorthStar planner
B. NorthStar bandwidth calendaring
C. NorthStar maintenance Mode
D. Centralized Path computation
Answer: A
20
IT Certification Guaranteed, The Easy Way!
NO.102 You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an
Internet circuit as long as it satisfies the SLA requirements.
In this scenario, what would you use to accomplish this task?
A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN
Answer: B
NO.103 A customer wants to provide advanced Layer 4 through Layer 7 security services for a
VMware NSX microsegementation deployment.
Which platform would you recommend using in this scenario?
A. ACX Series
B. vMX Series
C. vSRX Series
D. QFX Series
Answer: C
NO.104 According to the juniper network, what is the recommended external routing protocol for
the underlay network?
A. IS-IS
B. EGP
C. OSPF
21
IT Certification Guaranteed, The Easy Way!
D. BGP
Answer: D
NO.106 Which two product are required when deploying vSRX as a partner security service in
VMware NSX? (Choose two)
A. VMware vROPs
B. VMware NSX manager
C. Junos Space Security Director
D. IDP sensor
Answer: B,C
NO.108 Which CSO component enables ISPs to set up and manage the virtual network and
customers? **************
A. Service and Infrastructure Monitor
B. Designer Tools
C. Administration Portal
D. Customer Portal
Answer: C
NO.109 What are two roles of sandboxing in Sky ATP? (choose two)
A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis
Answer: B,D
22
IT Certification Guaranteed, The Easy Way!
C. IP address
D. Customer name
Answer: C
NO.111 You must create a security policy that works cross your multicloud, Kubernetes, and
OpenStack deployments.
Which product will accomplish this task?
A. Contrail Security
B. Policy Enforcer
C. Sky ATP
D. Juniper ATP
Answer: D
NO.114 You want to secure sensitive data and detect malware in your network.
Which component would be used to satisfy this requirement?
A. Contrail cloud
B. Network director
C. AppFormix
D. Sky ATP
Answer: B
23
IT Certification Guaranteed, The Easy Way!
Answer: C
NO.116 Which type of API does contrail service orchestration provide when connecting with OSS
and BSS applications?
A. TLS
B. REST
C. XMPP
D. SOAP
Answer: B
NO.117 Which open source management framework does VMware NSX use to manage VXLANs on
Junos device?
A. OVSDB
B. Contrail networking
C. OpenFlow
D. OpenConfig
Answer: A
NO.119 What are two examples of public cloud providers? (Choose two.)
A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services
Answer: C,D
NO.120 Which two capabilities are supported with the cSRX firewall?(choose two)
A. IPS
B. routing instances
C. chassis clustering
D. Layer 2 deployment
Answer: A,B
24