Juniper JN0-213 Practice Test - Questions Answers, Page 4

List of questions
Question 31

What is the most privileged protection ring?
In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults and malicious behavior. Rings are arranged in a hierarchy from most privileged (most trusted, usually numbered zero) to least privileged (least trusted, usually with the highest ring number).On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware12. Reference from Juniper site:Wikipedia,GeeksforGeeks,Notes
Question 32

Which two statements are correct about Network Functions Virtualization (NFV)? (Choose two.)
Network Functions Virtualization (NFV) is a network architecture concept that uses IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect or chain together to create communication services3.The NFV framework explains how Virtual Network Functions (VNFs) fit into the whole solution4.The NFV Infrastructure (NFVI) is a component of NFV that consists of the infrastructure components ---compute, storage, networking---on a platform to support software4. Reference from Juniper site:Red Hat,VMware,Wikipedia
Question 33

What are two available installation methods for an OpenShift cluster? (Choose two.)
There are two available installation methods for an OpenShift cluster.One is the installer-provisioned infrastructure method56, and the other is the user-provisioned infrastructure method56. Reference from Juniper site:VMware NSX Container Plugin,OpenShift Container Platform 4.10 Documentation
Question 34

Which two statements about Kubernetes are correct? (Choose two.)
In Kubernetes, all containers within a pod share the same IP address7.A ClusterIP service exposes pods to internal traffic only87. Reference from Juniper site:IBM,Kubernetes Documentation
Question 35

Which cloud service model provides access to networking, storage, servers, and virtualization in a cloud environment?
Infrastructure as a Service (IaaS) is a cloud service model that provides access to networking, storage, servers, and virtualization in a cloud environment91011. Reference from Juniper site:IBM,Google Cloud,Stackscale
Question 36

What are two reasons to create a Kubernetes deployment rather than work with pods directly? (Choose two.)
A Kubernetes deployment is a resource object in Kubernetes that provides declarative updates to applications.It allows you to describe an application's life cycle, such as which images to use for the app, the number of pods there should be, and the way in which they should be updated1. Two reasons to create a Kubernetes deployment rather than work with pods directly are:
A deployment ensures that the desired number of pods is running at all times1. If a pod crashes, the Deployment will automatically re-create it.
A deployment simplifies pod updates and roll-outs1.It allows you to describe a desired state in its specification and the Deployment controller changes the actual state to the desired state at a controlled rate1. Reference from Juniper site:Kubernetes Documentation
Question 37

You want to view pods with their IP addresses in OpenShift.
Which command would you use to accomplish this task?
To view pods with their IP addresses in OpenShift, you would use the commandoc get pods -o wide23.This command provides additional information such as the IP address and the node where the pod is located23. Reference from Juniper site:OpenShift Documentation,Stack Overflow
Question 38

Which two statements about overlay virtual networks are true? (Choose two.)
Overlay virtual networks are virtual logical networks constructed on top of an existing network using network virtualization technologies45.They decouple network services from the physical networking and interconnection technologies on the underlay network45. Two true statements about overlay virtual networks are:
Overlay virtual networks work well on an IP spine-and-leaf topology6.They can be created over underlay networks using network virtualization technologies4.
Overlay virtual networks allow both Layer 2 and Layer 3 communication65.They can serve not only different services (such as multiple departments) of the same tenant but also different tenants4. Reference from Juniper site:Microsoft Learn,Huawei IP Encyclopedia,Network Insight
Question 39

Which two functions does CN2 provide? (Choose two.)
Question 40

You have started a container in Docker, made configuration changes to it, and stopped the container. You notice the next time that you execute the docker run command, the changes have not persisted.
What is the problem?
Question