New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-460 Questions and Answers

Question # 6

Site A is configured with a WLAN and a policy. The administrator creates a configuration template at the organization level with additional policies for the same WLAN and mentions Site A in this template.

In this scenario, which statement is correct?

A.

The policy that is created in the config template at the organization level will execute first.

B.

The policy created at the organization level can be applied to a site group, not to an individual site.

C.

The policy that is created at the site level will execute first.

D.

There is no option to mention the site in the config template at the organization level.

Full Access
Question # 7

What is meant when aMarvis Actionis shown as “AI Validated”?

A.

The issue which triggered an alert has been set to Resolved status.

B.

Marvis has observed a new issue.

C.

Marvis has observed a recurring issue.

D.

Marvis has observed an issue that is no longer present.

Full Access
Question # 8

Which three switch testing tools are available when using Wired Assurance?(Choose three.)

A.

bounce port

B.

iPerf

C.

ping

D.

load factory-default

E.

cable test

Full Access
Question # 9

You are planning to deploy a fabric in your large campus with 10,000+ users. You will have both Layer 2 and Layer 3 devices that connect to your access switches. In this scenario, which campus architecture should you use?

A.

EVPN multihoming

B.

core-distribution with centrally-routed bridging (CRB)

C.

core-distribution with edge-routed bridging (ERB)

D.

IP Clos

Full Access
Question # 10

A switch is claimed in a Mist organization using the activation code.

What are two possible device states that the switch will have in this scenario?(Choose two.)

A.

Connected

B.

Inactive

C.

Active

D.

Unassigned

Full Access
Question # 11

Which two fields arerequiredwhen creating anew site? (Choose two.)

A.

RF template

B.

site name

C.

location

D.

time zone

Full Access
Question # 12

Which three steps should be part of the campus fabric deployment?(Choose three.)

A.

Define the physical connections.

B.

Define the networks of interest.

C.

Configure the DNS server.

D.

Choose the topology.

E.

Configure the group-based policy (GBP) tag.

Full Access
Question # 13

A customer has purchased five new switches and assigned them to a site.

In the configuration hierarchy, how should a user configure the name or role of each switch?

A.

Configure names and roles on the site-specific configuration.

B.

Configure additional CLI commands on each switch.

C.

Configure each switch individually on the Switch Configuration menu under the Switches menu.

D.

Add names and roles of each switch to the organization-level templates.

Full Access
Question # 14

Which statement about RadSec is correct?

A.

RadSec allows RADIUS authentication over TCP and TLS.

B.

RadSec allows RADIUS authentication over TCP and SSL.

C.

RadSec allows RADIUS authentication over UDP and TLS.

D.

RadSec allows RADIUS authentication over UDP and SSL.

Full Access
Question # 15

Which statement is correct regarding the Mist UI?

A.

The Mist UI is used to manage network devices.

B.

The Mist UI is used to distribute routes between your wireless and physical networks.

C.

The Mist UI is used by clients to connect to wireless networks.

D.

The Mist UI is used by cloud providers to provision VMs.

Full Access
Question # 16

You must move from a campus fabric core-distribution centrally-routed bridging (CRB)network to an edge-routed bridging (ERB)network.

In this scenario, where does the gateway for the network movie?

A.

from access to distribution

B.

from distribution to core

C.

from distribution to access

D.

from core to distribution

Full Access
Question # 17

Which statement is correct about Juniper Mist Wired Assurance capabilities?

A.

Juniper Mist delivers operational visibility, sets service level expectations (SLEs), and monitors throughput, successful connects, and switch health using pre-connection and post-connection performance metrics.

B.

Juniper Mist can enforce throughput and successful connects but does not provide operational visibility or service level expectations (SLEs) for Juniper EX Series and QFX Series switches.

C.

Juniper Mist focuses solely on post-connection service level expectations (SLEs) and does not monitor throughput or successful connects.

D.

Juniper Mist primarily focuses on pre-connection service level expectations (SLEs) and does not monitor throughput, successful connects, or switch health on Juniper EX Series and QFX Series switches.

Full Access
Question # 18

Which service level expectation (SLE) metric measures congestion on the uplink interface of a switch?

A.

Switch Health

B.

Successful Connect

C.

Asymmetric Uplink

D.

Throughput

Full Access
Question # 19

In addition to a Mist Wired Assurance subscription, which Junos OS license is required for EVPN-VXLAN?

A.

Advanced

B.

Essentials

C.

Premium

D.

Standard

Full Access
Question # 20

Which two statements are correct about using the Managed optionas your Juniper Mist Wired Assurance solution?(Choose two.)

A.

All information in the Mist AI for supported wired devices is read-only.

B.

A subscription is required.

C.

No subscription is required.

D.

All supported wired devices are fully managed by the Mist AI.

Full Access
Question # 21

Which statement is correct about a 3-stage campus fabric IP Clos?

A.

The distribution layer is connected to the access layer.

B.

The distribution layer is connected to the core layer.

C.

The core layer is connected to the access layer.

D.

The core layer devices are connected to each other.

Full Access
Question # 22

You are asked to forward event messages from Mist to an external log collector.

In this scenario, which feature would enable this capability?

A.

syslog

B.

webhooks

C.

NETCONF

D.

SNMP traps

Full Access
Question # 23

Which description accurately defines aMist AI 5-stage IP Clos network?

A.

It is a routing protocol specifically designed for campus fabrics, enabling efficient traffic forwarding and path selection.

B.

It is a type of EVPN tunnel encapsulation employed in data center networks for overlay routing.

C.

It is a hierarchical network architecture commonly used in campus fabrics, consisting of distribution, core, and access layers.

D.

It is a hierarchical network architecture used in large-scale campus deployments that extends the 3-stage Clos with additional spine and super-spine layers for scalability.

Full Access
Question # 24

A system administrator wants to onboard switches to a greenfield site.

In this scenario, which three actions will accomplish this task?(Choose three.)

A.

Use the Juniper Networks switch serial number.

B.

Use the Juniper Networks switch QR claim code.

C.

Use bulk claiming switches from a Juniper Mist sale order.

D.

Use the API to automate autoprovisioning of the switches to Juniper Mist.

E.

Use the Juniper Networks system MAC address number.

Full Access
Question # 25

InJuniper Mist cloud services, service level expectation (SLE) telemetry is collected from every device and stored for up to how long?

A.

1 month

B.

2 months

C.

7 days

D.

24 hours

Full Access