ExamGecko
Home Home / Juniper / JN0-213

Juniper JN0-213 Practice Test - Questions Answers, Page 4

Question list
Search
Search

What is the most privileged protection ring?

A.
3
A.
3
Answers
B.
2
B.
2
Answers
C.
0
C.
0
Answers
D.
1
D.
1
Answers
Suggested answer: C

Explanation:

In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults and malicious behavior. Rings are arranged in a hierarchy from most privileged (most trusted, usually numbered zero) to least privileged (least trusted, usually with the highest ring number).On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware12. Reference from Juniper site:Wikipedia,GeeksforGeeks,Notes

Which two statements are correct about Network Functions Virtualization (NFV)? (Choose two.)

A.
The NFV framework is defined by the W3C.
A.
The NFV framework is defined by the W3C.
Answers
B.
The NFV framework explains how VNFs fits into the whole solution.
B.
The NFV framework explains how VNFs fits into the whole solution.
Answers
C.
The NFV infrastructure (NFVI) is a component of NFV.
C.
The NFV infrastructure (NFVI) is a component of NFV.
Answers
D.
The NFV infrastructure (NFVI) is not a component of NFV.
D.
The NFV infrastructure (NFVI) is not a component of NFV.
Answers
Suggested answer: B, C

Explanation:

Network Functions Virtualization (NFV) is a network architecture concept that uses IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect or chain together to create communication services3.The NFV framework explains how Virtual Network Functions (VNFs) fit into the whole solution4.The NFV Infrastructure (NFVI) is a component of NFV that consists of the infrastructure components ---compute, storage, networking---on a platform to support software4. Reference from Juniper site:Red Hat,VMware,Wikipedia

What are two available installation methods for an OpenShift cluster? (Choose two.)

A.
installer-provisioned infrastructure
A.
installer-provisioned infrastructure
Answers
B.
kubesprav
B.
kubesprav
Answers
C.
user-provisioned infrastructure
C.
user-provisioned infrastructure
Answers
D.
kubeadm
D.
kubeadm
Answers
Suggested answer: A, C

Explanation:

There are two available installation methods for an OpenShift cluster.One is the installer-provisioned infrastructure method56, and the other is the user-provisioned infrastructure method56. Reference from Juniper site:VMware NSX Container Plugin,OpenShift Container Platform 4.10 Documentation

Which two statements about Kubernetes are correct? (Choose two.)

A.
A ClusterlP service exposes pods to internal and external traffic.
A.
A ClusterlP service exposes pods to internal and external traffic.
Answers
B.
All containers within a pod share the same IP address.
B.
All containers within a pod share the same IP address.
Answers
C.
Each container within a pod has a unique IP address.
C.
Each container within a pod has a unique IP address.
Answers
D.
A ClusterlP service exposes pods to internal traffic only
D.
A ClusterlP service exposes pods to internal traffic only
Answers
Suggested answer: B, D

Explanation:

In Kubernetes, all containers within a pod share the same IP address7.A ClusterIP service exposes pods to internal traffic only87. Reference from Juniper site:IBM,Kubernetes Documentation

Which cloud service model provides access to networking, storage, servers, and virtualization in a cloud environment?

A.
Infrastructure as a Service (laaS)
A.
Infrastructure as a Service (laaS)
Answers
B.
Platform as a Service (Paa)
B.
Platform as a Service (Paa)
Answers
C.
Software as a Service (Saa)
C.
Software as a Service (Saa)
Answers
D.
Database as a Service (Daa)
D.
Database as a Service (Daa)
Answers
Suggested answer: A

Explanation:

Infrastructure as a Service (IaaS) is a cloud service model that provides access to networking, storage, servers, and virtualization in a cloud environment91011. Reference from Juniper site:IBM,Google Cloud,Stackscale

What are two reasons to create a Kubernetes deployment rather than work with pods directly? (Choose two.)

A.
A deployment is ephemeral and therefore requires less configuration.
A.
A deployment is ephemeral and therefore requires less configuration.
Answers
B.
A deployment contains imperative instructions on how to re-create a pod if a pod dies unexpectedly.
B.
A deployment contains imperative instructions on how to re-create a pod if a pod dies unexpectedly.
Answers
C.
A deployment ensures that the desired number of pods is running at all times.
C.
A deployment ensures that the desired number of pods is running at all times.
Answers
D.
A deployment simplifies pod updates and roll-outs.
D.
A deployment simplifies pod updates and roll-outs.
Answers
Suggested answer: C, D

Explanation:

A Kubernetes deployment is a resource object in Kubernetes that provides declarative updates to applications.It allows you to describe an application's life cycle, such as which images to use for the app, the number of pods there should be, and the way in which they should be updated1. Two reasons to create a Kubernetes deployment rather than work with pods directly are:

A deployment ensures that the desired number of pods is running at all times1. If a pod crashes, the Deployment will automatically re-create it.

A deployment simplifies pod updates and roll-outs1.It allows you to describe a desired state in its specification and the Deployment controller changes the actual state to the desired state at a controlled rate1. Reference from Juniper site:Kubernetes Documentation

You want to view pods with their IP addresses in OpenShift.

Which command would you use to accomplish this task?

A.
oc get pods -o yaml
A.
oc get pods -o yaml
Answers
B.
oc get pods
B.
oc get pods
Answers
C.
oc get all
C.
oc get all
Answers
D.
oc get pods -o wide
D.
oc get pods -o wide
Answers
Suggested answer: D

Explanation:

To view pods with their IP addresses in OpenShift, you would use the commandoc get pods -o wide23.This command provides additional information such as the IP address and the node where the pod is located23. Reference from Juniper site:OpenShift Documentation,Stack Overflow

Which two statements about overlay virtual networks are true? (Choose two.)

A.
Overlay virtual networks work well on an IP spine-and-leaf topology.
A.
Overlay virtual networks work well on an IP spine-and-leaf topology.
Answers
B.
Overlay virtual networks only allow Layer 3 communication.
B.
Overlay virtual networks only allow Layer 3 communication.
Answers
C.
Overlay virtual networks allow both Layer 2 and Layer 3 communication.
C.
Overlay virtual networks allow both Layer 2 and Layer 3 communication.
Answers
D.
Overlay virtual networks use Juniper proprietary protocols.
D.
Overlay virtual networks use Juniper proprietary protocols.
Answers
Suggested answer: A, C

Explanation:

Overlay virtual networks are virtual logical networks constructed on top of an existing network using network virtualization technologies45.They decouple network services from the physical networking and interconnection technologies on the underlay network45. Two true statements about overlay virtual networks are:

Overlay virtual networks work well on an IP spine-and-leaf topology6.They can be created over underlay networks using network virtualization technologies4.

Overlay virtual networks allow both Layer 2 and Layer 3 communication65.They can serve not only different services (such as multiple departments) of the same tenant but also different tenants4. Reference from Juniper site:Microsoft Learn,Huawei IP Encyclopedia,Network Insight

Which two functions does CN2 provide? (Choose two.)

A.
It performs SDN functions in an NFV solution.
A.
It performs SDN functions in an NFV solution.
Answers
B.
It provides enhanced networking capabilities to private clouds.
B.
It provides enhanced networking capabilities to private clouds.
Answers
C.
It provides an orchestration solution for VMs and containers.
C.
It provides an orchestration solution for VMs and containers.
Answers
D.
It provides underlay network management capabilities.
D.
It provides underlay network management capabilities.
Answers
Suggested answer: B, C

Explanation:

CN2 (Cranial Nerve II), also known as the optic nerve, controls the special sense of vision.It transmits visual information from the retina to the vision centers of the brain78. Two functions that CN2 provides are:

It provides enhanced networking capabilities to private clouds78.It transmits special afferent impulses of light to the brain and is involved in several reflex arcs related to the ocular system7.

It provides an orchestration solution for VMs and containers78.It is a unique structure that functions as the bridge between the retinal layer of the eyes and the visual cortex of the brain7. Reference from Juniper site:Kenhub,Geeky Medics

You have started a container in Docker, made configuration changes to it, and stopped the container. You notice the next time that you execute the docker run command, the changes have not persisted.

What is the problem?

A.
The docker load command must be used to persist the change.
A.
The docker load command must be used to persist the change.
Answers
B.
Docker images need to be recompiled to make any changes.
B.
Docker images need to be recompiled to make any changes.
Answers
C.
The docker run command starts a new copy of the container, not the existing version.
C.
The docker run command starts a new copy of the container, not the existing version.
Answers
D.
The docker exec command needs to be run first to save and exit the running container.
D.
The docker exec command needs to be run first to save and exit the running container.
Answers
Suggested answer: C

Explanation:

Docker containers are designed to be ephemeral, meaning they run based on their current configuration. When a Docker container is stopped, it does not automatically save changes made during its runtime. When you executedocker run, it starts a new instance of the container, not an existing version with its changes[14-16]. If you want to persist changes between runs, you need to commit changes to a new Docker image or use Docker volumes for data persistence[14-16]. Reference from Juniper site: Stack Overflow, Docker Docs

Total 65 questions
Go to page: of 7