لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which type of tunnels are provisioned by the NorthStar controller?
A. IPsec VPNs
B. VPLs
C. MPLS LSPs
D. GRE over UDP
عرض الإجابة
اجابة صحيحة: C
السؤال #2
You must set up multiple collection points across your network to look for malware and rogue SSH attempts. What will allow you to accomplish this task?
A. AppFormix
B. NorthStar
C. networking
D. JATP
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which two hypervisors does the vMX support? (Choose two)
A. KVM
B. xen
C. ESXi
D. Hyper V
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
You are deploying a layer 3 underlay network with 10,000 devices and hosts. Which two statements are correct in this scenario? (Choose two.)
A. Loop prevention is provided by the routing protocol
B. Routing table can become very large
C. RSTP can be used for loop prevention
D. The MAC tables can become very large
عرض الإجابة
اجابة صحيحة: AB
السؤال #5
You are using the Juniper connected security solution to protect your network from malware. However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of analyzing files greater than 10MB. Which two components would allow you to accomplish this task ? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
عرض الإجابة
اجابة صحيحة: BD
السؤال #6
What is used to provide secure access to a vSRX in a public cloud?
A. authorized key pairs
B. SSH key pairs
C. private key pairs
D. public key pairs
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
A. JTI provides real-time telemetry
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
What are two Microservices provided by contrail services orchestration? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
عرض الإجابة
اجابة صحيحة: BD
السؤال #9
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
عرض الإجابة
اجابة صحيحة: ADE
السؤال #10
Which type of service would allow you to provision five servers with Windows Server 2016 installed?
A. IaaS
B. PaaS
C. SaaS
D. FWaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which two protocols are used in a Contrail system to exchange routing information? (Choose two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
عرض الإجابة
اجابة صحيحة: AB
السؤال #12
Which statement is true about Junos Space security director?
A. Security director is a standalone management platform
B. Security director is a centralized security policy manager
C. Security director is an SDN controller
D. Security director is a network orchestrator
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which statement is true about the vSRX Series and VMware NSX integration?
A. The NSX Distributed Firewall provides a container based layer of protection
B. VMware NSX provides advanced Layer 4 through Layer 7 security services
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment
D. The NSX Distributed Firewall users application identification
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which message type is supported by the Junos Telemetry interface?
A. GPB
B. OpenShift
C. JET
D. YANG
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)
A. MC-LAG
B. BGP
C. LACP
D. TRILL
عرض الإجابة
اجابة صحيحة: AC
السؤال #16
In which two scenarios is Contrail used? (Choose two.)
A. private cloud networking
B. network hardware lifecycle management
C. Network Functions Virtualization
D. policy-based routing
عرض الإجابة
اجابة صحيحة: AC
السؤال #17
Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron
عرض الإجابة
اجابة صحيحة: C
السؤال #18
What are two characteristics of vMX series devices? (Choose two)
A. The vMX series uses carrier-grade routing optimized for the x86 environment
B. The vMX series requires a license for production environment
C. The vMX series uses a trio ASIC
D. The vMX series uses containerization technology for rapid service enablement
عرض الإجابة
اجابة صحيحة: AB
السؤال #19
What provisions new switches or routers in your network automatically, with no manual intervention?
A. PCEP
B. ZTP
C. BGP
D. RSVP
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which statement describes AppFormix?
A. AppFormix is a high-performance virtual device that secures virtualized and cloud environments
B. AppFormix is the SDN automation platform for OpenStack Iaas
C. AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
D. AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which statement is correct about alarms in AppFormix?
A. Static alarm are compared against fixed thresholds
B. Alarm thresholds cannot be changed by the user
C. Alarm actions cannot be change by the user
D. Static alarms are compared against historical data
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which statement is correct when deploying services inside containers?
A. Containers can always be deployed for free
B. Containers use fewer resources than VMs
C. Services have dedicated processor and memory resources on each server
D. Service must not be deployed using the same operating system
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Which open source management framework does VMware NSX use to manage VXLANs on Junos device?
A. OVSDB
B. Contrail networking
C. OpenFlow
D. OpenConfig
عرض الإجابة
اجابة صحيحة: A
السؤال #24
What are two roles of sandboxing in Sky ATP? (Choose two)
A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis
عرض الإجابة
اجابة صحيحة: BD
السؤال #25
Which statement about contrail is true?
A. The contrail controller places a vRouter each virtual host in the network
B. The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances
C. The contrail virtual router segments virtual machines on physical hosts into different security zones
D. The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network
عرض الإجابة
اجابة صحيحة: AB
السؤال #26
Which organization is responsible for defining cloud computing?
A. IEEE
B. ANSI
C. NIST
D. IANA
عرض الإجابة
اجابة صحيحة: C
السؤال #27
Which method does WANDL use to collect live network information?
A. FTP
B. SOAP
C. TFTP
D. SNMP
عرض الإجابة
اجابة صحيحة: D
السؤال #28
What information does an underlay network use to route data?
A. Application name
B. Customer ID
C. IP address
D. Customer name
عرض الإجابة
اجابة صحيحة: C
السؤال #29
Which statement is true about NFV containers?
A. NFV containers usually provide fewer functions than VM-based NFs
B. NFV containers require an underlying hypervisor for deployment
C. NFV containers take longer to instantiate than virtual machines
D. NFV containers require more memory and storage resources to deploy
عرض الإجابة
اجابة صحيحة: A
السؤال #30
What are two characteristics of cloud computing? (Choose two.)
A. Services are provisioned using automation
B. Services are provisioned by the customer
عرض الإجابة
اجابة صحيحة: AB
السؤال #31
A customer is planning a significant upgrade to their network that requires an increase in bandwidth. They want to schedule the increase for a specific date and time. Which feature within the NorthStar controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: