ExamGecko
Home / Juniper / JN0-213 / List of questions
Ask Question

Juniper JN0-213 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

What is the most privileged protection ring?

3
3
2
2
0
0
1
1
Suggested answer: C
Explanation:

In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults and malicious behavior. Rings are arranged in a hierarchy from most privileged (most trusted, usually numbered zero) to least privileged (least trusted, usually with the highest ring number).On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware12. Reference from Juniper site:Wikipedia,GeeksforGeeks,Notes

asked 18/09/2024
Anil Dagar
43 questions

Question 32

Report Export Collapse

Which two statements are correct about Network Functions Virtualization (NFV)? (Choose two.)

The NFV framework is defined by the W3C.
The NFV framework is defined by the W3C.
The NFV framework explains how VNFs fits into the whole solution.
The NFV framework explains how VNFs fits into the whole solution.
The NFV infrastructure (NFVI) is a component of NFV.
The NFV infrastructure (NFVI) is a component of NFV.
The NFV infrastructure (NFVI) is not a component of NFV.
The NFV infrastructure (NFVI) is not a component of NFV.
Suggested answer: B, C
Explanation:

Network Functions Virtualization (NFV) is a network architecture concept that uses IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect or chain together to create communication services3.The NFV framework explains how Virtual Network Functions (VNFs) fit into the whole solution4.The NFV Infrastructure (NFVI) is a component of NFV that consists of the infrastructure components ---compute, storage, networking---on a platform to support software4. Reference from Juniper site:Red Hat,VMware,Wikipedia

asked 18/09/2024
Raed Alshehri
50 questions

Question 33

Report Export Collapse

What are two available installation methods for an OpenShift cluster? (Choose two.)

installer-provisioned infrastructure
installer-provisioned infrastructure
kubesprav
kubesprav
user-provisioned infrastructure
user-provisioned infrastructure
kubeadm
kubeadm
Suggested answer: A, C
Explanation:

There are two available installation methods for an OpenShift cluster.One is the installer-provisioned infrastructure method56, and the other is the user-provisioned infrastructure method56. Reference from Juniper site:VMware NSX Container Plugin,OpenShift Container Platform 4.10 Documentation

asked 18/09/2024
Bruce Tablada
40 questions

Question 34

Report Export Collapse

Which two statements about Kubernetes are correct? (Choose two.)

A ClusterlP service exposes pods to internal and external traffic.
A ClusterlP service exposes pods to internal and external traffic.
All containers within a pod share the same IP address.
All containers within a pod share the same IP address.
Each container within a pod has a unique IP address.
Each container within a pod has a unique IP address.
A ClusterlP service exposes pods to internal traffic only
A ClusterlP service exposes pods to internal traffic only
Suggested answer: B, D
Explanation:

In Kubernetes, all containers within a pod share the same IP address7.A ClusterIP service exposes pods to internal traffic only87. Reference from Juniper site:IBM,Kubernetes Documentation

asked 18/09/2024
Vu Tung
31 questions

Question 35

Report Export Collapse

Which cloud service model provides access to networking, storage, servers, and virtualization in a cloud environment?

Infrastructure as a Service (laaS)
Infrastructure as a Service (laaS)
Platform as a Service (Paa)
Platform as a Service (Paa)
Software as a Service (Saa)
Software as a Service (Saa)
Database as a Service (Daa)
Database as a Service (Daa)
Suggested answer: A
Explanation:

Infrastructure as a Service (IaaS) is a cloud service model that provides access to networking, storage, servers, and virtualization in a cloud environment91011. Reference from Juniper site:IBM,Google Cloud,Stackscale

asked 18/09/2024
Victor Platonov
43 questions

Question 36

Report Export Collapse

What are two reasons to create a Kubernetes deployment rather than work with pods directly? (Choose two.)

A deployment is ephemeral and therefore requires less configuration.
A deployment is ephemeral and therefore requires less configuration.
A deployment contains imperative instructions on how to re-create a pod if a pod dies unexpectedly.
A deployment contains imperative instructions on how to re-create a pod if a pod dies unexpectedly.
A deployment ensures that the desired number of pods is running at all times.
A deployment ensures that the desired number of pods is running at all times.
A deployment simplifies pod updates and roll-outs.
A deployment simplifies pod updates and roll-outs.
Suggested answer: C, D
Explanation:

A Kubernetes deployment is a resource object in Kubernetes that provides declarative updates to applications.It allows you to describe an application's life cycle, such as which images to use for the app, the number of pods there should be, and the way in which they should be updated1. Two reasons to create a Kubernetes deployment rather than work with pods directly are:

A deployment ensures that the desired number of pods is running at all times1. If a pod crashes, the Deployment will automatically re-create it.

A deployment simplifies pod updates and roll-outs1.It allows you to describe a desired state in its specification and the Deployment controller changes the actual state to the desired state at a controlled rate1. Reference from Juniper site:Kubernetes Documentation

asked 18/09/2024
Junaid Ahmed Mohammed
48 questions

Question 37

Report Export Collapse

You want to view pods with their IP addresses in OpenShift.

Which command would you use to accomplish this task?

oc get pods -o yaml
oc get pods -o yaml
oc get pods
oc get pods
oc get all
oc get all
oc get pods -o wide
oc get pods -o wide
Suggested answer: D
Explanation:

To view pods with their IP addresses in OpenShift, you would use the commandoc get pods -o wide23.This command provides additional information such as the IP address and the node where the pod is located23. Reference from Juniper site:OpenShift Documentation,Stack Overflow

asked 18/09/2024
Novy Kingra
47 questions

Question 38

Report Export Collapse

Which two statements about overlay virtual networks are true? (Choose two.)

Overlay virtual networks work well on an IP spine-and-leaf topology.
Overlay virtual networks work well on an IP spine-and-leaf topology.
Overlay virtual networks only allow Layer 3 communication.
Overlay virtual networks only allow Layer 3 communication.
Overlay virtual networks allow both Layer 2 and Layer 3 communication.
Overlay virtual networks allow both Layer 2 and Layer 3 communication.
Overlay virtual networks use Juniper proprietary protocols.
Overlay virtual networks use Juniper proprietary protocols.
Suggested answer: A, C
Explanation:

Overlay virtual networks are virtual logical networks constructed on top of an existing network using network virtualization technologies45.They decouple network services from the physical networking and interconnection technologies on the underlay network45. Two true statements about overlay virtual networks are:

Overlay virtual networks work well on an IP spine-and-leaf topology6.They can be created over underlay networks using network virtualization technologies4.

Overlay virtual networks allow both Layer 2 and Layer 3 communication65.They can serve not only different services (such as multiple departments) of the same tenant but also different tenants4. Reference from Juniper site:Microsoft Learn,Huawei IP Encyclopedia,Network Insight

asked 18/09/2024
Pamela Joanne Ang
37 questions

Question 39

Report Export Collapse

Which two functions does CN2 provide? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 40

Report Export Collapse

You have started a container in Docker, made configuration changes to it, and stopped the container. You notice the next time that you execute the docker run command, the changes have not persisted.

What is the problem?

Become a Premium Member for full access
  Unlock Premium Member
Total 65 questions
Go to page: of 7