لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which Juniper product provides insight into the underlay and overly network at the same time?
A. Security director
B. Juniper extension Toolkit
C. Edge services director
D. Contrail Analytics
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which OpenStack service manage image storage?
A. Glance
B. Swift
C. Nova
D. Heat
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which two statements are correct when using the native sensors model for the Juniper Telemetry Interface with AppFormix? (Choose two.)
A. Telemetry data is exported from the data plane
B. Additional software must be installed on the Juniper device
C. No additional software must be installed on the Juniper device
D. Telemetry data is exported from the control plane
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
You want to prevent a single point of failure in your underlay network. Which two protocols would be used to accomplish this task? (Choose two)
A. LACP
B. VSTP
C. MC-LAG
D. RSTP
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
Which statement is true regarding Layer 3 underlay fabric networks?
A. Layer 3 underlay fabric networks can only be used across public networks
B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
D. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A customer wants to provide advanced Layer 4 through Layer 7 security services for a VMware NSX microsegementation deployment. Which platform would you recommend using in this scenario?
A. ACX Series
B. vMX Series
C. vSRX Series
D. QFX Series
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
A. JTI provides real-time telemetry
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
Which statement describes AppFormix?
A. AppFormix is a high-performance virtual device that secures virtualized and cloud environments
B. AppFormix is the SDN automation platform for OpenStack Iaas
C. AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
D. AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A customer want to deploy a website that can scale as needed. Which type of services should the customer purchase in this scenario?
A. DBaaS
B. SaaS
C. BGPaaS
D. FWaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #10
You are deploying a layer 3 underlay network with 10,000 devices and hosts. Which two statements are correct in this scenario? (Choose two.)
A. Loop prevention is provided by the routing protocol
B. Routing table can become very large
C. RSTP can be used for loop prevention
D. The MAC tables can become very large
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
Which two statement describe virtual network functions (VNFs)? (Choose two)
A. VNFs are provided at a customer's site or telco cloud
B. VNFs represent the service that monitors and tracks whether the services are performing according to design
C. VNFs represent the infrastructure the comprises the telco underlay network
D. VNFs can be deployed as a software function within a single x86 platform
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)
A. MC-LAG
B. BGP
C. LACP
D. TRILL
عرض الإجابة
اجابة صحيحة: AC
السؤال #14
Which node in a Contrail cluster is used to collect data from the routers?
A. control node
B. analytics node
C. compute node
D. configuration node
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which two statement are true about SDN WAN implementations? (Choose two)
A. SDN WAN uses VXLAN to connect POPs
B. SDN WAN uses data center orchestration platforms
C. SDN WAN uses a centralized a control plane
D. SDN WAN uses MPLS tunnels to connect POPs
عرض الإجابة
اجابة صحيحة: CD
السؤال #16
Which statement about contrail is true?
A. The contrail controller places a vRouter each virtual host in the network
B. The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances
C. The contrail virtual router segments virtual machines on physical hosts into different security zones
D. The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network
عرض الإجابة
اجابة صحيحة: AB
السؤال #17
What is a primary difference between NFV and VNF?
A. A VNF defines the network underlay tunnel methodology while NFV is firewall that inspects traffic in the overlay network
B. NFV is the framework that describes how a virtual function should operate while VNF is the virtual function itself
C. A VNF operates on a bare metal server while NFV operates on a switch
D. NFV identifies the host on which the VNF operates
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which statement is true regarding Layer 3 underlay fabric networks?
A. Layer 3 underlay fabric networks can only be used across public networks
B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
D. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which two statements are correct when using the native sensors model for the Juniper Telemetry Interface with AppFormix? (Choose two.)
A. Telemetry data is exported from the data plane
B. Additional software must be installed on the Juniper device
C. No additional software must be installed on the Juniper device
D. Telemetry data is exported from the control plane
عرض الإجابة
اجابة صحيحة: AC
السؤال #20
Which statement is true about NFV containers?
A. NFV containers usually provide fewer functions than VM-based NFs
B. NFV containers require an underlying hypervisor for deployment
C. NFV containers take longer to instantiate than virtual machines
D. NFV containers require more memory and storage resources to deploy
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Server-1 has an infection and is communicating with a command and control server on the Internet. You want to ensure that the infection on Server-1 does not infect Server-2? Which two actions accomplish this task? (Choose two.)
A. Deploy Sky ATP with advanced anti-malware protection
B. Deploy Sky ATP with CandC protection
C. Deploy Policy Enhancer to isolate infected host
D. Deploy Sky ATP with GeoIP protection
عرض الإجابة
اجابة صحيحة: AB
السؤال #22
Which two protocols are used in a Contrail system to exchange routing information? (Choose two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
عرض الإجابة
اجابة صحيحة: ADE
السؤال #24
You must set up multiple collection points across your network to look for malware and rogue SSH attempts. What will allow you to accomplish this task?
A. AppFormix
B. NorthStar
C. networking
D. JATP
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which message type is supported by the Junos Telemetry interface?
A. GPB
B. OpenShift
C. JET
D. YANG
عرض الإجابة
اجابة صحيحة: A
السؤال #26
You want to prevent a single point of failure in your underlay network. Which two protocols would be used to accomplish this task? (Choose two)
A. LACP
B. VSTP
C. MC-LAG
D. RSTP
عرض الإجابة
اجابة صحيحة: AC
السؤال #27
Which cloud architecture provides developers a framework on which to develop and customize applications?
A. DBaaS
B. PaaS
C. IaaS
D. FWaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which type of SDN are you using when you automate a Junos device using PyEZ and NETCONF?
A. API-based SDN
B. SDN as an overlay
C. SDN as an underlay
D. OpenFlow-based SDN
عرض الإجابة
اجابة صحيحة: A
السؤال #29
A company requests increased bandwidth during two specific periods each year. Which solution will accomplish the desired result?
A. NorthStar planner
B. NorthStar bandwidth calendaring
C. NorthStar maintenance Mode
D. Centralized Path computation
عرض الإجابة
اجابة صحيحة: A
السؤال #30
Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (Choose two)
A. TFTP
B. PCEP
C. NETCONF
D. HTTPS
عرض الإجابة
اجابة صحيحة: BC
السؤال #31
A customer is planning a significant upgrade to their network that requires an increase in bandwidth. They want to schedule the increase for a specific date and time. Which feature within the NorthStar controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: