Which two statements are correct regarding a pristine configuration in Juniper Apstra? (Choose two.)
Answer : A, C
The following two statements are incorrect in this scenario:
You are installing a Juniper Apstra server in your data center. You have multiple users that will be expected to configure, manage, and carry out operational tasks in your data center. You have decided to implement remote user authentication for the role-based access control of your Apstra server.
In this scenario, which three methods are supported? (Choose three.)
Answer : A, B, C
To implement remote user authentication for the role-based access control of your Apstra server, you can use one of the following methods: TACACS+, LDAP, or RADIUS. These are the protocols that Juniper Apstra supports to authenticate and authorize users based on roles assigned to individual users within an enterprise. You can configure the Apstra server to use one or more of these protocols as the authentication sources and specify the order of preference. You can also configure the Apstra server to use local user accounts as a fallback option if the remote authentication fails. The other options are incorrect because:
D) SAML is wrong because SAML (Security Assertion Markup Language) is not a supported protocol for remote user authentication for the role-based access control of your Apstra server. SAML is an XML-based standard for exchanging authentication and authorization data between different parties, such as identity providers and service providers. SAML is commonly used for web-based single sign-on (SSO) scenarios, but it is not compatible with the Apstra server.
E) Auth0 is wrong because Auth0 is not a protocol, but a service that provides authentication and authorization solutions for web and mobile applications. Auth0 is a platform that supports various protocols and standards, such as OAuth, OpenID Connect, SAML, and JWT. Auth0 is not a supported service for remote user authentication for the role-based access control of your Apstra server.Reference:
[Juniper Apstra] Authentication and Authorization Debugging1
Juniper Apstra has indicated an anomaly with respect to cabling.
What are two ways to remediate the issue? (Choose two.)
Answer : A, D
A cabling anomaly is an issue that occurs when the physical connections between the devices in the data center fabric do not match the expected connections based on the Apstra Reference Design. A cabling anomaly can cause problems such as incorrect routing, suboptimal traffic flow, or device isolation. To remediate the issue, you can use one or both of the following methods:
Import / Export Cabling Map (Datacenter)
Exhibit.
Referring to the exhibit, how many tack types ate used in the staged blueprint?
Answer : D
The following three statements are incorrect in this scenario:
A) six. This is not true, because there are not six rack types in the table, but only two. The number six corresponds to the number of racks that have the same rack type: ServerRack.
B) three. This is not true, because there are not three rack types in the table, but only two. The number three does not correspond to any relevant information in the table or the image.
C) seven. This is not true, because there are not seven rack types in the table, but only two. The number seven corresponds to the total number of racks in the table, not the rack types.
You are adding a new switch to Juniper Apstra software. The Managed Devices page shows the "0 OS-Quarantined" status. What is the proper next step to make the device ready for use in a blueprint?
You are using Juniper Apstra to design a data center fabric.
In this scenario, which object type associates a specific vendor model to a logical device?
Answer : B
Which statement about Juniper Apstra role-based access control is correct?
Answer : B
The following three statements are incorrect in this scenario: