لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which node in a Contrail cluster is used to collect data from the routers?
A. control node
B. analytics node
C. compute node
D. configuration node
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which two protocols are used in a Contrail system to exchange routing information? (Choose two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
عرض الإجابة
اجابة صحيحة: AB
السؤال #3
Which statement is true about VNFs?
A. VNFs are always physical devices
B. VNFs are virtual devices
C. VNFs are only used in service provider clouds
D. VNFs are only used in data centers
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which statement is correct about CSO?
A. CSO is a complete orchestration system and can replace OpenStack
B. CSO has a gateway component and can be used to connect data centers
C. CSO can be used to establish and monitor LSPs in a service provider network
D. CSO can be used to manage VNFs at service provider's customer site
عرض الإجابة
اجابة صحيحة: D
السؤال #5
What is used to provide secure access to a vSRX in a public cloud?
A. authorized key pairs
B. SSH key pairs
C. private key pairs
D. public key pairs
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A customer wants to provide advanced Layer 4 through Layer 7 security services for a VMware NSX microsegementation deployment. Which platform would you recommend using in this scenario?
A. ACX Series
B. vMX Series
C. vSRX Series
D. QFX Series
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which cloud architecture provides developers a framework on which to develop and customize applications?
A. DBaaS
B. PaaS
C. IaaS
D. FWaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which type of SDN are you using when you automate a Junos device using PyEZ and NETCONF?
A. API-based SDN
B. SDN as an overlay
C. SDN as an underlay
D. OpenFlow-based SDN
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which statement is true regarding Layer 3 underlay fabric networks?
A. Layer 3 underlay fabric networks can only be used across public networks
B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
D. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks
عرض الإجابة
اجابة صحيحة: D
السؤال #10
What provisions new switches or routers in your network automatically, with no manual intervention?
A. PCEP
B. ZTP
C. BGP
D. RSVP
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which statement is true about the OpenConfig data model?
A. It supports YANG
B. It provides UDP-based transport
C. It is embedded in all devices that run the Junos OS
D. It uses MySQL as the default database structure
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A customer wants to deploy a complicated service and needs complete control of all applications, servers, and server operating systems. Which type of service should the customer purchase in this scenario?
A. FWaaS
B. SaaS
C. PaaS
D. IaaS
عرض الإجابة
اجابة صحيحة: D
السؤال #13
What is the Web interface component of OpenStack?
A. Horizon
B. Neutron
C. Nova
D. Cinder
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which organization is responsible for developing and maintaining the NFV framework standard?
A. Metro Ethernet Forum (MEF)
B. MultiService Forum (MSF)
C. European Telecommunications Standards Institute (ETSI)
D. International Organization for Standardization (ISO)
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which API does CSO use to connect with a service provider's OSS/BSS?
A. Configuration API
B. JET API
C. Analytics API
D. RESTful API
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A customer is planning a significant upgrade to their network that requires an increase in bandwidth. They want to schedule the increase for a specific date and time. Which feature within the NorthStar Controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which protocol does a Contrail node use to communicate with vRouters on compute nodes?
A. IF-MAP
B. XMPP
C. BGP
D. NETCONF
عرض الإجابة
اجابة صحيحة: B
السؤال #18
What is a benefit to using a Cloud CPE solution over a traditional CPE solution?
A. A customer can bring their own hardware for the provider to manage
B. The provider extends their underlay network into the customer site
C. The ability to add or remove services without new networking hardware
D. All infrastructure support is supplied by a single network vendor
عرض الإجابة
اجابة صحيحة: C
السؤال #19
What are two design concepts for a Clos IP Fabric? (Choose two)
A. All devices must be the same model
B. All spine devices must connect to all spine devices
C. All link connecting stages should be the same speed
D. All leaf devices must connect to all spine devices
عرض الإجابة
اجابة صحيحة: CD
السؤال #20
What are two benefits of implementing the Juniper Telemetry Interface for network monitoring? (Choose two)
A. It enables real-time security event monitoring
B. It enables real-time performance monitoring
C. It eliminates the need for remote data collectors
D. It eliminates resource-intensive polling of network devices
عرض الإجابة
اجابة صحيحة: BD
السؤال #21
Which platform was designed to act as a CPE device?
A. PTX Series
B. MX Series
C. EX Series
D. NFX Series
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which Juniper virtual platform is designed to operate in an isolated Linux environment directly on the host server?
A. VRR
B. vSRX
C. vMX
D. vSRX
عرض الإجابة
اجابة صحيحة: A
السؤال #23
What are two characteristics of an overlay network in a cloud networking data center? (Choose two)
A. An overlay network provides physical connectivity between hosts
B. An overlay network uses Layer 2 tunneling technologies to interconnect hosts
C. An overlay network must reside in virtual machines within the data center
D. An overlay network provides logical connectivity between tenant networks
عرض الإجابة
اجابة صحيحة: BD
السؤال #24
Which protocol would you use to share IP and MAC information in the overlay network?
A. OSPF
B. IS-IS
C. EVPN
D. IGMP
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Which Juniper product is designed to generate threat containment data and continuously monitor network traffic for security threat activity?
A. Policy Enforcer
B. AppFormix
C. Cyphort
D. Network Director
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Which protocol is used to transport data in an overlay network?
A. BGP
B. EVPN
C. OSPF
D. VXLAN
عرض الإجابة
اجابة صحيحة: D
السؤال #27
A customer must provision multiple devices in their data center and would like to automate this process. What would you use to accomplish this task?
A. NSSU
B. SSO
C. ISSU
D. ZTP
عرض الإجابة
اجابة صحيحة: D
السؤال #28
According to Juniper Networks, what are two recommended interior routing protocols for the underlay network? (Choose two)
A. IS-IS
B. RIP
C. OSPF
D. EIGRP
عرض الإجابة
اجابة صحيحة: AC
السؤال #29
Which statement is correct about VNFs?
A. All containers are VNFs
B. VNFs are inserted into the physical data path when deployed
C. VNFs are software applications used in Network Functions Virtualization (NFV)
D. All virtual machines are VNFs
عرض الإجابة
اجابة صحيحة: C
السؤال #30
What are two protocols NorthStar uses to provision LSPs? (Choose two)
A. IF-MAP
B. XMPP
C. PCEP
D. NETCONF
عرض الإجابة
اجابة صحيحة: CD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: