1. According to the juniper
network, what is the recommended external routing protocol for the underlay
network?
A. IS-IS
B. EGP
C. OSPF
D. BGP
Answer: D
2. Which two capabilities are
supported with the cSRX firewall? (choose two)
A. IPS
B. routing instances
C. chassis clustering
D. Layer 2 deployment
Answer: AC
3. Which cloud CPE component
manages the end-to-end path from the CPE to the central office or to another
CPE?
A. service orchestration
B. infrastructure
orchestration
C. physica telco cloud
infrastructure
D. virtual network functions
Answer: A
4. What are the two objectives of
SDN?(choose two)
A. centralization of control
plane
B. physical separation of the
control-plane from the data plane
C. centralization of the
forwarding plane
D. centralization of the
services plane
Answer: AB
5. What is an advantage of the
Junos Telemetry Interface(JTI) over SNMP?
A. JTI can pull data more
frequently
B. JTI always transfers data
over HTTP
C. JTI never transfers data
over UDP
D. JTI can push data more
frequently
Answer: D
6. You have 100 small branch
offices around the world. You must use a single pane of glass to monitor EX
Series devices for port status, ports exceeding maximum bandwidth, ports with
maximum errors, and ports with maximum packet loss
In this scenario, which
product would satisfy the requirement?
A. Contrail SD-WAN
B. Contrail SD-LAN
C. Contrail Networking
D. Contrail Cloud
Answer: A
7. Which two statements are
correct about the NFV framework?(Choose two)
A. The NFV framework is
defined by ANSI
B. The NFV framework is
defined by ETSI
C. The NFV framework enables
horizontally scalable deployments of services
D. A spine and leaf
implementation is an example of the NFV framework
Answer: BC
8. Which mechanism allows
tenants to interconnect across an overlay network?
A. tunnels
B. subnets
C. EBGP connections
D. P2P OSPF adjacencies
Answer: C
9. What are two examples of
SaaS?(Choose two) *****************
A. Amazon Web Services
B. SalesForce
C. Google Apps
D. IBM Cloud
Answer: BC
10. Which two Juniper devices
are used as a CSO CPE devices(Choose two.)
A. SRX
B. NFX
C. QFX
D. MX
Answer: AB
11. What are two
characteristics of Juniper's Connected Security Solution?(Choose two.)
A. manual secure policy
control
B. dynamic VPN connections
C. centralized management
D. enforcement everywhere on
the network
Answer: CD
12. Which two statements are
true about virtualized platforms?(Choose two.)
A. The vSRX must have two vCPU
dedicated to the vCP
B. The vMX used separate VMs
to host the vCP and vFP
C. The vSRX must have one vCPU
dedicated to the vCP
D. The vMX uses one VM to host
the vCP and vFP
Answer: BC
13. You are responsible for
optimizing a global MPLS WAN. You must determine the optimal MPLS forwarding
paths and automate the provisioning of the forwarding paths into the network
Which Juniper Networks SDN
solution will satisfy the requirements?
A. NorthStar Controller
B. Policy Enforcer
C. Contrail
D. Network Director
Answer: A
14. Which two benefits does
the Junos Telemetry Interface(JTI) provide in an AppFormix architecture?(Choose
two.)
A. JTI enables you to deploy
security policies to vSRX devices
B. JTI uses a push model to
deliver data asynchronously
C. JTI enables you to collect
and export data from resources such as firewall filters
D. JTI uses an SNMP pull model
to eliminate additional processing
Answer: BC
15. Devices in your data
center have become unwilling participants of botnet attacks.
In this scenario, which
security technology should you use to stop this behavior?
A. Policy Enhancer
B. Sky ATP GeoIP threat
protection
C. Sky ATP C&C threat
protection
D. IPsec
Answer: C
16. Which statement is true
regarding an OpenFlow controller-based software defined network?
**********************
A. The forwarding plane of
each device in the network is programmed by the controller
B. The control plane of each
device in the network is instantiated by the controller
C. The SDN controller pushes
configuration files to each device in the network using RESTful APIs
D. The forwarding plane of
each device in the network is managed by the device
Answer: A
17. What are two technologies
that a vMX's control plane uses to communicate with the forwarding plane on the
same servers?(Choose two.) ****
A. 802.1Q
B. Virtio
C. SR-IOV
D. OVSDB
Answer: BC
18. Which interface is used by
applications, orchestration system, and other types of business systems to
communicate with as SDN controller?
A. controller interface
B. northbound interface
C. east-west interface
D. southbound interface
Answer: B
19. Which two data models are
supported for the Junos Telemetry Interface (JTI)? (Choose two.)
A. Azure Application Insights
B. Native Sensors
C. Amazon Kinesis
D. OpenConfig
Answer: BD
20. You need to find a product
that will allow for the deployment of security devices to a new tenant edge
network in less than one second
Which product accomplishes
this task?
A. MX
B. NFX
C. vSRX
D. cSRX
Answer: D
21. You are deploying a vMX
device in your network
Which two virtualized
components are required in this scenario?
A. virtual forwarding plane
B. virtual chassis port
C. virtual chassis fabric
D. virtual control plane
Answer: AD
22. Which product is used to
perform capacity planning of MPLS WANs?
A. Contrail Cloud
B. NorthStar Planner
C. Cloud Service Orchestration
D. VMware NSX
Answer: B
23. Which protocol is used by
the NorthStar Controller to discover existing tunnels in a service provider or
large enterprise WAN?
A. SNMP
B. PCEP
C. REST
D. NETCONF
Answer: B
24. Which two statements
describe cloud CPE?(Choose two.)
A. Cloud CPE require heavy
investment in vendor-specific hardware
B. Cloud CPE encourages
administrators to use all-in-one appliances
C. Cloud CPE allows
multivendor, open support of software-based functions
D. Cloud CPE eliminates the
need for investing in expensive hardware
Answer: BD
25. You need to control and
steer application traffic while maintaining an end-to-end view of the WAN and
LAN.
Which Juniper cloud product
will satisfy the requirements in this scenario?
A. Sky ATP
B. Contrail Service
Orchestration
C. Contrail Cloud
D. Sky Enterprise
Answer: B
26. You are deploying a Layer
2 underlay network with 2,000 devices and hosts.
Which two statements are
correct?
A. Network routing tables can
become very large and unmanageable
B. RPF is used for loop
prevention
C. The MAC tables can become
very large and unmanageable
D. RSTP can be used for loop
prevention
Answer: CD
27. What are two protocols
used by NorthStar Controller to discover the network topology?(Choose two) **************
A. SNMP
B. OSPF-TE
C. NETCONF
D. BGP-LS
Answer: BD
28. Which type of SDN is shown
in the exhibit?
A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay
Answer: A
29. AppFormix has been
deployed in your data center using the Juniper Telemetry Interface(JTI) native
sensors. However, the underlay devices have not yet been set up to work with
the JTI native sensors.
Which action is required for
the JTI native sensors to work properly?
A. Install the AppFormix
network agent on the underlay devices
B. Enable NETCONF over SSH on
the underlay devices
C. Enable SSH on the underlay
devices
D. Enable GPB messaging on the
underlay devices
Answer: A
30. Which two statements are
true about an SDN controller?(Choose two.)
A. An SDN controller automates
repetitive tasks in a network
B. An SDN controller regulates
traffic transmission rates in a network
C. An SDN controller
centralizes control and configuration of a network
D. An SDN controller stores
and manages software mages
Answer: AC
31. Which CSO component
enables ISPs to set up and manage the virtual network and customers?
**************
A. Service and Infrastructure
Monitor
B. Designer Tools
C. Administration Portal
D. Customer Portal
Answer: C
32. You must create a security
policy that works cross your multicloud, Kubernetes, and OpenStack deployments.
Which product will accomplish
this task?
A. Contrail Security
B. Policy Enforcer
C. Sky ATP
D. Juniper ATP
Answer: D
33. What are three
orchestrators that integrate with Contrail? (Choose three)
A. VirtualBox
B. Kubernetes
C. Ubuntu
D. OpenStack
E. vSphere
Answer: BDE
34. You are using the
NorthStar Controller to manage your WAN. You are required to remove a node from
the network for maintenance purposes. You want to compute and provision
alternate forwarding paths so that traffic is re-touted around the node being
taken offline for maintenance.
Which NorthStar Controller
feature would be used in this scenario?
A. path diversity
B. maintenance mode
C. shared risk link groups
D. node diversity
Answer: B
35. You are using service
chains.
In this scenario, which
component launches the NFV VM?
A. vRouter
B. NorthStar Controller
C. compute node
D. orchestrator
Answer: D
36. Your company has three
connections consisting of MPLS, Internet, and wireless connections,
respectively. You must separate traffic according to the type of application
sending that traffic across the three links
Which product will facilitate
this requirement?
A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN
Answer: A
37. Which two statements are
true regarding private cloud services?(Choose two.)
A. A private cloud must apply
encryption to all stored data
B. A private cloud has
dedicated resources for individual customers
C. A private cloud can be
deployed in a service provider network
D. A private cloud cannot
connect to a public cloud
Answer: BC
38. You are required to set up
zero-day malware dedication for your private cloud without sending files off
site for analysis.
What will accomplish this
task?
A. JATP
B. IDP
C. UTM
D. Sky ATP
Answer: D
39. Which two statements are
true about cSRX firewalls? (Choose two.)
A. The host OS can be
different from the guest OS
B. The host OS and image OS
must match
C. The cSRX does not use
static CPU reservations
D. The cSRX uses static CPU
reservations
Answer: AD
40. Which statement defines a
public cloud?
A. The cloud infrastructure is
a composition of two or more strict cloud infrastructures
B. The cloud infrastructure is
provisioned for exclusive use by a specific community of consumers from
organizations that have shared concerns
C. The cloud infrastructure is
provisioned for exclusive use by a single organization comprising multiple
consumers
D. The cloud infrastructure is
provisioned for open use by the general public
Answer: D
41. Which statement is correct
about SDN?
A. The SDN controller has a
centralized view of the network
B. The SDN controller must
provide a manual method for configuration
C. SDN simplifies the network
by combining the control and forwarding planes into a single controller
D. The configuration and
management of an SDN solution should be distributed to the edge of the network
Answer: A
42. AppFormix alarm
notification are sent to an HTTP server using which format?
A. plain text
B. XML
C. CSV
D. JSON
Answer: D
43. What are two examples of
public cloud providers? (Choose two.)
A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services
Answer: CD
44. From where does AppFormix
gather performance metrics in a network?
A. from RPM probes sent across
the network
B. from statistics NFVs
instantiated in the data path
C. from an agent on the host
or system
D. from a REST API connection
Answer: C
45. What are two reasons to
use a vMX over a physical MX Series devices in your deployment? (Choose two)
A. A vMX provides more routing
features.
B. A vMX accelerates adding
new services
C. A vMX has a lower barrier
of entry
D. A vMX increases analytic
capabilities
Answer: BD
46. You want to automate the
management of virtualized applications using Contrail Networking
Which type of SDN is used in
this scenario?
A. OpenFlow SDN
B. API SDN
C. Overlay SDN
D. Ansible Automation
Answer: B
47. Which statement is correct
about overlay network?
A. An overlay network requires
an OSPF area.
B. An overlay network must
have switches interconnected in a spine-leaf implementation
C. An overlay network uses
tunneling technologies
D. An overlay network requires
the CLOS architecture
Answer: C
48. Which juniper product
provides insight into the underlay and overlay network at the same time?
*************
A. Security Director
B. AppFormix
C. Edge Services Director
D. Juniper Extension Toolkit
E. Contrail Analysitcs
Answer: E
49. What are two
characteristics of Policy Enforcer? (Choose two)
A. Policy Enforcer has its own
standalone GUI
B. Policy Enforcer
consolidated threat information from multiple sources
C. Policy Enforcer provides
telemetry data for a collector device
D. Policy Enforcer is
integrated with Security Director
Answer: BD
50. Which protocol used to
communicate LSP and status information between NorthStar controller and label
edge routers?
A. PCEP
B. ICCP
C. OSPF
D. BGP
Answer: A
51. Which type of the topology
is shown in the exhibit?(picture)
A. EGP topology
B. spine-and-leaf topology
C. tree topology
D. hub-and-spoke topology
Answer: B
52. Which Juniper product is
used to remotely provision the NFX250 platform for Network Functions
Virtualization?
A. Contrail Service
Orchestration
B. Contrail Security
C. Virtual Route Reflector
D. Junos Space Security
Director
Answer: B
53. Which Junos Space
application integrates with both VMware vSphere and VMware NSX solutions to
automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services
Director
Answer: C
54. Which CSO component
enables the monitoring of the CSO system to provide real-time data about the
Cloud CPE solution?
A. Administration Portal
B. AppFormix
C. Designer Tools
D. Customer Portal
E. Service and Infrastructure
Monitor
Answer: E
55. What are two
characteristics of cloud computing?(Choose two.)
A. customer-owned equipment
B. measured service
C. resource pooling
D. unrestricted public access
to all resources
Answer: BC
56. You are the administrator
of an MPLS WAN. Intermittent WAN hardware failures are causing customer traffic
to route over newly computed forwarding paths that do not satisfy service level
agreements
Which Juniper Networks
solution would be used to analyze this problem?
*************************
A. Network Director
B. AppFormix
C. NorthStar Planner
D. Contrail
Answer: D
57. What are two goals of
cloud security automation?(Choose two) *******************************
A. to centrally manage
security policies
B. to transition all security
functions to cloud platforms
C. to automate responses to
detected security threats
D. to implement all security
functions in hardware
Answer: AC
58. You are asked to reduce
traffic on an MPLS VPN by automatically moving the traffic to an Internet
circuit as long as it satisfies the SLA requirements.
In this scenario, what would
you use to accomplish this task?
A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN
Answer: D
59. Which statement is correct
when deploying services inside containers?
A. Containers can always be
deployed for free
B. Containers use fewer
resources than VMs
C. Services have dedicated
processor and memory resources on each server
D. Service must not be
deployed using the same operating system
Answer: B
60. Server-1 has an infection
and is communicating with a command and control server on the Internet. You
want to ensure that the infection on Server-1 does not infect Server-2?
Which two actions accomplish
this task?(Choose two.)
A. Deploy Sky ATP with
advanced anti-malware protection
B. Deploy Sky ATP with C&C
protection
C. Deploy Policy Enhancer to
isolate infected host
D. Deploy Sky ATP with GeoIP
protection
Answer: AB
61. Which two platforms share
the same automation scripts?(Choose two)
A. vMX Series
B. MX Series
C. Junos Space
D. Contrail
Answer: AB
62. Which two protocols
provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
Answer: BD
63. Which two pricing models
are available from AWS Marketplace for vSRX consumption? (Choose two.)
A. pay as you go
B. bring your own license
C. based on the number of
policies
D. annual subscription
Answer: AB
64. Which two statements are correct
when using the native sensors model for the Juniper Telemetry Interface with
AppFormix?(Choose two.)
A. Telemetry data is exported
from the data plane
B. Additional software must be
installed on the Juniper device
C. No additional software must
be installed on the Juniper device
D. Telemetry data is exported
from the control plane
Answer: AC
65. A customer wants to deploy
a website that can scale as needed
Which type of services should
the customer purchase in this scenario?
A. DBaaS
B. SaaS
C. BGPaaS
D. FWaaS
Answer: B
No comments:
Post a Comment