Juniper JN0-481 - Data Center, Specialist (JNCIS-DC) Exam
Page: 1 / 13
Total 65 questions
Question #1 (Topic: Exam A)
An operator is working on a capacity-panning exercise. The operator needs to examine the pre-built time series information regarding link utilization.
In the Juniper Apstra UI, which top-level tab would the operator have to access to find this information?
In the Juniper Apstra UI, which top-level tab would the operator have to access to find this information?
A. Active
B. Staged
C. Analytics
D. Dashboard
Answer: C
Question #2 (Topic: Exam A)
Referring to the exhibit, what happens when an operator clicks the Accept Changes button on the right side of the screen in Juniper Apstra?
A. Apstra will add a similar configuration from a known device context to accomplish the goal of the CLI-entered configuration.
B. Apstra will incorporate the new CLI into the "golden config".
C. Apstra will not commit new changes to this device until the user clicks the Apply Full Config button.
D. Apstra will stop warning about the changes, but the changes will be overwritten at the next commit.
Answer: B
Question #3 (Topic: Exam A)
Which two statements are correct about Juniper Apstra reference designs? (Choose two.)
A. The Freeform reference design requires knowledge of device CLI.
B. The data center reference design supports only Junos devices.
C. The data center reference design requires knowledge of device CLI.
D. The Freeform reference design supports only Junos devices.
Answer: AC
Question #4 (Topic: Exam A)
You have accessed your deployed blueprint and see the banner shown in the exhibit.
Which two statements are correct in this scenario? (Choose two.)
Which two statements are correct in this scenario? (Choose two.)
A. Devices must be assigned to profiles.
B. There are changes that are not active on the fabric.
C. Resources must be assigned to devices.
D. There are anomalies that must be addressed.
Answer: BD
Question #5 (Topic: Exam A)
What are two types of policies that Juniper Apstra uses to push to switches using Security Policies? (Choose two.)
A. filter-based forwarding (ChooseFBF)
B. firewall filters
C. policy-based routing (ChoosePBR)
D. access control lists (ChooseACLs)
Answer: BD