Juniper JN0-480 Data Center, Specialist Exam Practice Test

Page: 1 / 14
Total 65 questions
Question 1

You are installing a Juniper Apstra server in your data center. You have multiple users that will be expected to configure, manage, and carry out operational tasks in your data center. You have decided to implement remote user authentication for the role-based access control of your Apstra server.

In this scenario, which three methods are supported? (Choose three.)



Answer : A, B, C

To implement remote user authentication for the role-based access control of your Apstra server, you can use one of the following methods: TACACS+, LDAP, or RADIUS. These are the protocols that Juniper Apstra supports to authenticate and authorize users based on roles assigned to individual users within an enterprise. You can configure the Apstra server to use one or more of these protocols as the authentication sources and specify the order of preference. You can also configure the Apstra server to use local user accounts as a fallback option if the remote authentication fails. The other options are incorrect because:

D) SAML is wrong because SAML (Security Assertion Markup Language) is not a supported protocol for remote user authentication for the role-based access control of your Apstra server. SAML is an XML-based standard for exchanging authentication and authorization data between different parties, such as identity providers and service providers. SAML is commonly used for web-based single sign-on (SSO) scenarios, but it is not compatible with the Apstra server.

E) Auth0 is wrong because Auth0 is not a protocol, but a service that provides authentication and authorization solutions for web and mobile applications. Auth0 is a platform that supports various protocols and standards, such as OAuth, OpenID Connect, SAML, and JWT. Auth0 is not a supported service for remote user authentication for the role-based access control of your Apstra server.Reference:

User Authentication Overview

[Juniper Apstra] Authentication and Authorization Debugging1

Authenticate User (API)

Configure Apstra Server


Question 2

Juniper Apstra has indicated an anomaly with respect to cabling.

What are two ways to remediate the issue? (Choose two.)



Question 3

Exhibit.

Referring to the exhibit, how many tack types ate used in the staged blueprint?



Answer : D

Referring to the exhibit, the image shows the Racks table under the Staged menu in the Juniper Apstra UI. The Racks table displays the details of the racks that are used in the blueprint, such as the name, rack type, and date.The rack type is a resource that defines the type and number of leaf devices, access switches, and/or generic systems that are used in rack builds1. The image shows seven racks in the table, but only two rack types: BorderLeaf and ServerRack. Therefore, the statement D is correct in this scenario.

The following three statements are incorrect in this scenario:

A) six. This is not true, because there are not six rack types in the table, but only two. The number six corresponds to the number of racks that have the same rack type: ServerRack.

B) three. This is not true, because there are not three rack types in the table, but only two. The number three does not correspond to any relevant information in the table or the image.

C) seven. This is not true, because there are not seven rack types in the table, but only two. The number seven corresponds to the total number of racks in the table, not the rack types.


Rack Types (Datacenter Design)

Racks (Staged)

Question 4
Question 5

Which three statements describe intent-based analytics? (Choose three.)



Answer : B, C, D

Intent-based analytics (IBA) is a feature of Juniper Apstra that allows you to combine intent from the network design with current and historic data from devices to reason about the network at-large1. IBA has the following characteristics:

It is a real-time information processing pipeline. This means that IBA can ingest, process, and analyze large amounts of data from devices in real time, using agents and probes. Agents are software components that collect data from devices and send them to the Apstra server.Probes are user-defined queries that aggregate data across devices and generate advanced data that can be more easily reasoned about1.

It is used to establish network performance baselines. This means that IBA can use the advanced data to measure and monitor the network performance against the expected outcomes and service levels.IBA can also use the historic data to create baselines that represent the normal behavior and state of the network2.

It alerts the network operator when network performance moves away from the baseline. This means that IBA can detect and report any anomalies or deviations from the baseline or the intent in the network.IBA can also provide insights and recommendations for troubleshooting and resolving the issues2.

The following two statements are incorrect in this scenario:

It indicates when device operating versions require updating. This is not true, because IBA does not provide any information or guidance about the device operating versions or updates.IBA is focused on the network performance and compliance, not on the device maintenance or upgrade1.

It collects information from vendor websites. This is not true, because IBA does not collect any information from vendor websites or external sources.IBA only collects information from the devices in the network, using agents and probes1.


Intent-Based Analytics --- Apstra 3.3.0 documentation

What is Intent Based Networking? | Juniper Networks US

Question 6

Exhibit.

Referring to the exhibit, what is the minimum information you must add to create a new routing zone?



Answer : C

To create a new routing zone, you must specify the VRF Name, VLAN ID, and VNI for the routing zone. These are the mandatory fields in the user interface shown in the exhibit. The VRF Name is the name of the L3 domain that isolates the IP traffic of the routing zone from other routing zones. The VLAN ID is the identifier for the VLAN tagged Layer 3 links on external connections. The VNI is the VxLAN Network Identifier associated with the routing zone. The Routing Policies are optional fields that allow you to configure import and export route targets for the routing zone. These are only applicable for EVPN routing zones, which use MP-EBGP as the overlay control protocol. The other options are incorrect because:

A) VRF Name only is wrong because you also need to specify the VLAN ID and VNI for the routing zone.

B) VRF Name and Routing policies is wrong because you also need to specify the VLAN ID and VNI for the routing zone. Routing policies are optional and only relevant for EVPN routing zones.

D) VRF Name, VLAN ID, VNI, Routing Policies is wrong because Routing Policies are optional and not required to create a new routing zone.Reference:

Routing Zones (Virtual)

Data Center Automation Using Juniper Apstra


Question 7

You are receiving cable, interface, and BGP anomalies from several devices within the data center fabric. In Juniper Apstr

a. how would you troubleshoot these types of errors?



Page:    1 / 14   
Total 65 questions