Cloud, Associate v1.0 (JN0-211)

Page:    1 / 5   
Total 65 questions

Which two components are part of the AppFormix architecture? (Choose two.)

  • A. policy controller
  • B. compute node
  • C. SDN controller
  • D. data platform


Answer : AD

You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second.
Which product accomplishes this task?

  • A. MX
  • B. cSRX
  • C. vSRX
  • D. NFX


Answer : B

What are two characteristics of Policy Enforcer? (Choose two.)

  • A. Policy Enforcer has its own standalone GUI.
  • B. Policy Enforcer is integrated with Security Director.
  • C. Policy Enforcer consolidates threat information from multiple sources.
  • D. Policy Enforcer provides telemetry data for a collector device.


Answer : BC

Devices in your data center have become unwilling participants of botnet attacks.
In this scenario, which security technology should you use to stop this behavior?

  • A. Sky ATP C&C threat protection
  • B. Sky ATP GeoIP threat protection
  • C. IPsec
  • D. Policy Enforcer


Answer : A

AppFormix alarm notifications are sent to an HTTP server using which format?

  • A. XML
  • B. plain text
  • C. JSON
  • D. CSV


Answer : C

Which Juniper product provides insight into the underlay and overlay network at the same time?

  • A. Juniper Extension Toolkit
  • B. Security Director
  • C. AppFormix
  • D. Edge Services Director


Answer : B

Which two statements are true about virtualized platforms? (Choose two.)

  • A. The vSRX must have two vCPUs dedicated to the vCP.
  • B. The vMX uses one VM to host the vCP and vFP.
  • C. The vMX uses separate VMs to host the vCP and vFP.
  • D. The vSRX must have one vCPU dedicated to the vCP.


Answer : CD

What are two protocols used by the NorthStar Controller to discover the network topology? (Choose two.)

  • A. OSPF-TE
  • B. NETCONF
  • C. SNMP
  • D. BGP-LS


Answer : AD

Which statement is correct when deploying services inside containers?

  • A. Containers use fewer resources than VMs.
  • B. Containers can always be deployed for free.
  • C. Services have dedicated processor and memory resources on each server.
  • D. Services must not be deployed using the same operating system.


Answer : A

Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)

  • A. Native Sensors
  • B. Azure Application Insights
  • C. Amazon Kinesis
  • D. OpenConfig


Answer : AD

You are using service chains.
In this scenario, which component launches the NFV VM?

  • A. orchestrator
  • B. vRouter
  • C. NorthStar Controller
  • D. compute node


Answer : D

You are required to set up zero-day malware detection for your private cloud without sending files off site for analysis.
What will accomplish this task?

  • A. JATP
  • B. Sky ATP
  • C. UTM
  • D. IDP


Answer : A

Which two benefits does the Junos Telemetry Interface (JTI) provide in an AppFormix architecture? (Choose two.)

  • A. JTI uses a push model to deliver data asynchronously.
  • B. JTI uses an SNMP pull model to eliminate additional processing.
  • C. JTI enables you to deploy security policies to vSRX devices.
  • D. JTI enables you to collect and export data from resources such as firewall filters.


Answer : AD

You are deploying a vMX device in your network.
Which two virtualized components are required in this scenario? (Choose two.)

  • A. virtual chassis fabric
  • B. virtual chassis port
  • C. virtual forwarding plane
  • D. virtual control plane


Answer : CD

You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an Internet circuit as long as it satisfies the SLA requirements.
In this scenario, what would you use to accomplish this task?

  • A. Contrail Cloud
  • B. Contrail SD-WAN
  • C. AppFormix
  • D. NorthStar


Answer : D

Page:    1 / 5   
Total 65 questions