JN0-213 Dumps

JN0-213 Braindumps JN0-213 Real Questions JN0-213 Practice Test

JN0-213 Actual Questions


Juniper


JN0-213


Cloud, Associate (JNCIA-Cloud)


https://killexams.com/pass4sure/exam-detail/JN0-213

Question: 24


Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution?


  1. Administration Portal

  2. AppFormix

  3. Designer Tools

  4. Customer Portal

  5. Service and Infrastructure Monitor


Answer: E Question: 25

Which two statements describe cloud CPE? (Choose two.)


  1. Cloud CPE require heavy investment in vendor-specific hardware

  2. Cloud CPE encourages administrators to use all-in-one appliances

  3. Cloud CPE allows multivendor, open support of software-based functions

  4. Cloud CPE eliminates the need for investing in expensive hardware


Answer: A,B,D Question: 26

What is used to provide secure access to a vSRX in a public cloud?


  1. authorized key pairs

  2. SSH key pairs

  3. private key pairs

  4. public key pairs


Answer: B Question: 27

Which statement is true regarding an OpenFlow controller-based software defined network?


  1. The forwarding plane of each device in the network is programmed by the controller

  2. The control plane of each device in the network is instantiated by the controller

  3. The SDN controller pushes configuration files to each device in the network using RESTful APIs

  4. The forwarding plane of each device in the network is managed by the device


Answer: A Question: 28

Which statement about contrail is true?


  1. The contrail controller places a vRouter each virtual host in the network

  2. The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances

  3. The contrail virtual router segments virtual machines on physical hosts into different security zones

  4. The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network


Answer: A,B Question: 29

Which statement is true regarding Layer 3 underlay fabric networks?


  1. Layer 3 underlay fabric networks can only be used across public networks

  2. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants

  3. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols

  4. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks


Answer: D Question: 30

What operates below the virtualization layer in an NFV system?


  1. The NFV management and orchestration components

  2. the virtualized network functions (VNFs)

  3. the compute, storage, and network hardware

  4. the OSS and BSS management systems


Answer: C Question: 31

Which two features does the Junos Telemetry interface (JTI) support? (Choose two).


  1. JTI provides real-time telemetry.

  2. JTI does not need a collector to store data

  3. JTI requires no configuration

  4. JTI can stream in multiple data models


Answer: A,D Question: 32

What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)


  1. A vMX provides more routing features.

  2. A vMX accelerates adding new services

  3. A vMX has a lower barrier of entry

  4. A vMX increases analytic capabilities


Answer: A,B,C


Explanation:

https://www.juniper.net/documentation/en_US/vmx/topics/concept/vmx-overview.html


Question: 33


In which two scenarios is Contrail used? (Choose two.)


  1. private cloud networking

  2. network hardware lifecycle management

  3. Network Functions Virtualization

  4. policy-based routing


Answer: A,C Question: 34

Which statement is correct about SDN?


  1. The SDN controller has a centralized view of the network

  2. The SDN controller must provide a manual method for configuration

  3. SDN simplifies the network by combining the control and forwarding planes into a single controller

  4. The configuration and management of an SDN solution should be distributed to the edge of the network


Answer: A Question: 35

You want to prevent a single point of failure in your underlay network. Which two protocols would be used to accomplish this task? (choose two)

  1. LACP

  2. VSTP

  3. MC-LAG

  4. RSTP


Answer: A,C Question: 36

What are three orchestrators that integrate with Contrail? (Choose three)


  1. VirtualBox

  2. Kubernetes

  3. Ubuntu

  4. OpenStack

  5. vSphere


Answer: A,B,D,E Question: 37

Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)


  1. TFTP

  2. PCEP

  3. NETCONF

  4. HTTPS


Answer: A,B,C Question: 38

Which two statements are true regarding private cloud services? (Choose two.)


  1. A private cloud must apply encryption to all stored data

  2. A private cloud has dedicated resources for individual customers

  3. A private cloud can be deployed in a service provider network

  4. A private cloud cannot connect to a public cloud


Answer: A,B,C Question: 39

You are required to set up zero-day malware dedication for your private cloud without sending files off site for analysis.


What will accomplish this task?


  1. JATP

  2. IDP

  3. UTM

  4. Sky ATP


Answer: D Question: 40

What information does an underlay network use to route data?


  1. Application name

  2. Customer ID

  3. IP address

  4. Customer name


Answer: C