Juniper JN0-211 Cloud, Associate (JNCIA-Cloud) Online Training
Juniper JN0-211 Online Training
The questions for JN0-211 were last updated at Nov 19,2024.
- Exam Code: JN0-211
- Exam Name: Cloud, Associate (JNCIA-Cloud)
- Certification Provider: Juniper
- Latest update: Nov 19,2024
Referring to the exhibit, Server-1 has an infection and is communicating with a command and control server on the internet. You want to ensure that the infection on server-1 does not infect server-2.
Which two actions accomplish this task? (Choose two)
- A . Deploy Sky ATP with C&C protection.
- B . Deploy Sky ATP with anti-malware protection
- C . Deploy policy enforcer to isolate infected hosts
- D . Deploy Sky ATP with Geo IP protection
You are using the NorthStar controller to manage your WAN. You are required to remove a node from the network for maintenance. You want to compute and provision alternate forwarding paths so that traffic is re-routed around the node being taken offline for maintenance.
Which NorthStar controller feature would be used in this scenario?
- A . Maintenance mode
- B . Shared risk link groups
- C . Node diversity
- D . Path diversity
You are the administrator of an MPLS WAN intermittent WAN hardware failure are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements.
Which Juniper Networks solution would be used to analyze this problem?
- A . Network director
- B . Contrail
- C . NorthStar Planner
- D . AppFormix
You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second.
Which product accomplishes this task?
- A . NFX
- B . MX
- C . cSRX
- D . vSRX
Which mechanism allows tenants to interconnect across an overly network?
- A . EBGP connections
- B . P2P OSPF adjacencies
- C . Subnets
- D . Tunnels
Which two protocols provide loop prevention in an underlay network? (Choose two)
- A . OSPF
- B . VPLS
- C . MSTP
- D . EVPN
Which statements are correct about the NFV framework? (Choose two)
- A . A spine and leaf implementation is an example of the NFV framework
- B . The NFV framework is defined by ANSI
- C . The NFV framework is defined by ETSI
- D . The NFV Framework enables horizontally scalable deployments of services
Devices in your data center have become unwilling participants of botnet attacks. In this scenario.
Which security technology should you use to stop this behavior?
- A . IPsec
- B . Policy enforcer
- C . Sky ATP C&C threat protection
- D . Sky ATP GeoIP threat protection
You want to automate the management of virtualized applications using contrail networking.
Which type of SDN is used in this scenario?
- A . API SDN
- B . OpenFlow SDN
- C . Ansible automation
- D . Overly SDN
Which protocol is used by the NorthStar controller to discover existing tunnels in a service provider or large enterprise WAN?
- A . SNMP
- B . REST
- C . PCEP
- D . NETCONF