لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are two roles of sandboxing in Sky ATP? (Choose two)
A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
Which type of API does contrail service orchestration provide when connecting with OSS and BSS applications?
A. TLS
B. REST
C. XMPP
D. SOAP
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which two components are part of the AppFormix architecture? (Choose two)
A. Policy controller
B. Compute node
C. SDN controller
D. Data platform
عرض الإجابة
اجابة صحيحة: AD
السؤال #4
Which method does WANDL use to collect live network information?
A. FTP
B. SOAP
C. TFTP
D. SNMP
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which statement is true about the OpenConfig data model?
A. It supports YANG
B. It provides UDP-based transport
C. It is embedded in all devices that run the Junos OS
D. It uses MySQL as the default database structure
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which OpenStack service manage image storage?
A. Glance
B. Swift
C. Nova
D. Heat
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What are two concepts of private cloud? (Choose two)
A. Resources are dedicated to your organization
B. Resources are accessed through a private connection
C. Non-critical resources are located outside of your organization
D. Resources are not secured by firewalls
عرض الإجابة
اجابة صحيحة: AB
السؤال #8
Which statement is true about the vSRX Series and VMware NSX integration?
A. The NSX Distributed Firewall provides a container based layer of protection
B. VMware NSX provides advanced Layer 4 through Layer 7 security services
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment
D. The NSX Distributed Firewall users application identification
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which statement is correct about alarms in AppFormix?
A. Static alarm are compared against fixed thresholds
B. Alarm thresholds cannot be changed by the user
C. Alarm actions cannot be change by the user
D. Static alarms are compared against historical data
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which type of tunnels are provisioned by the NorthStar controller?
A. IPsec VPNs
B. VPLs
C. MPLS LSPs
D. GRE over UDP
عرض الإجابة
اجابة صحيحة: C
السؤال #11
In which two scenarios is Contrail used? (Choose two.)
A. private cloud networking
B. network hardware lifecycle management
C. Network Functions Virtualization
D. policy-based routing
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)
A. pay as you go
B. bring your own license
C. based on the number of policies
D. annual subscription
عرض الإجابة
اجابة صحيحة: BC
السؤال #13
What is used to provide secure access to a vSRX in a public cloud?
A. authorized key pairs
B. SSH key pairs
C. private key pairs
D. public key pairs
عرض الإجابة
اجابة صحيحة: B
السؤال #14
You want to secure sensitive data and detect malware in your network. Which component would be used to satisfy this requirement?
A. AppFormix
B. Sky ATP
C. Network director
D. Contrail cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What provisions new switches or routers in your network automatically, with no manual intervention?
A. PCEP
B. ZTP
C. BGP
D. RSVP
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which type of service would allow you to provision five servers with Windows Server 2016 installed?
A. IaaS
B. PaaS
C. SaaS
D. FWaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which organization is responsible for defining cloud computing?
A. IEEE
B. ANSI
C. NIST
D. IANA
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which two product are required when deploying vSRX as a partner security service in VMware NSX? (Choose two)
A. VMware vROPs
B. VMware NSX manager
C. Junos Space Security Director
D. IDP sensor
عرض الإجابة
اجابة صحيحة: BC
السؤال #19
Which protocol is used to transport monitoring data in Juniper's open and extensible data model?
A. TCP
B. SNMP
C. SOAP
D. UDP
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
عرض الإجابة
اجابة صحيحة: AD
السؤال #21
Which statement is true about Junos Space security director?
A. Security director is a standalone management platform
B. Security director is a centralized security policy manager
C. Security director is an SDN controller
D. Security director is a network orchestrator
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which statement is true about VNFs?
A. VNFs are always physical devices
B. VNFs are virtual devices
C. VNFs are only used in service provider clouds
D. VNFs are only used in data centers
عرض الإجابة
اجابة صحيحة: B
السؤال #23
What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (Choose two)
A. Performance
B. Basic
C. Lite
D. Enhanced
عرض الإجابة
اجابة صحيحة: AC
السؤال #24
What are two major components of the NorthStar Controller system? (Choose two.)
A. PCE
B. PCC
C. CE
D. vPE
عرض الإجابة
اجابة صحيحة: AB
السؤال #25
Which two platforms share the same automation scripts? (Choose two)
A. vMX Series
B. MX Series
C. Junos Space
D. Contrail
عرض الإجابة
اجابة صحيحة: AB
السؤال #26
Which open source management framework does VMware NSX use to manage VXLANs on Junos device?
A. OVSDB
B. Contrail networking
C. OpenFlow
D. OpenConfig
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which Juniper product provides insight into the underlay and overly network at the same time?
A. Security director
B. Juniper extension Toolkit
C. Edge services director
D. Contrail Analytics
عرض الإجابة
اجابة صحيحة: D
السؤال #28
You are using the Juniper connected security solution to protect your network from malware. However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of analyzing files greater than 10MB. Which two components would allow you to accomplish this task ? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
عرض الإجابة
اجابة صحيحة: BD
السؤال #29
What are two characteristics of cloud computing? (Choose two.)
A. Services are provisioned using automation
B. Services are provisioned by the customer
عرض الإجابة
اجابة صحيحة: AB
السؤال #30
Which statement is correct about CSO?
A. CSO is a complete orchestration system and can replace OpenStack
B. CSO has a gateway component and can be used to connect data centers
C. CSO can be used to establish and monitor LSPs in a service provider network
D. CSO can be used to manage VNFs at service provider's customer site
عرض الإجابة
اجابة صحيحة: D
السؤال #31
What are two characteristics of vMX series devices? (Choose two)
A. The vMX series uses carrier-grade routing optimized for the x86 environment
B. The vMX series requires a license for production environment
C. The vMX series uses a trio ASIC
D. The vMX series uses containerization technology for rapid service enablement
عرض الإجابة
اجابة صحيحة: AB
السؤال #32
What are two Microservices provided by contrail services orchestration? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
عرض الإجابة
اجابة صحيحة: BD
السؤال #33
Which two hypervisors does the vMX support? (Choose two)
A. KVM
B. xen
C. ESXi
D. Hyper V
عرض الإجابة
اجابة صحيحة: AC
السؤال #34
What information does an underlay network use to route data?
A. Application name
B. Customer ID
C. IP address
D. Customer name
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: