{"id":13602,"date":"2024-07-05T10:43:08","date_gmt":"2024-07-05T02:43:08","guid":{"rendered":"http:\/\/www.killtest.com.tw\/?p=13602"},"modified":"2024-07-05T10:43:08","modified_gmt":"2024-07-05T02:43:08","slug":"jncis-dc%e6%a8%a3%e9%a1%8c%e8%a7%a3%e6%9e%90","status":"publish","type":"post","link":"https:\/\/www.killtest.com.tw\/?p=13602","title":{"rendered":"JNCIS-DC\u6a23\u984c\u89e3\u6790"},"content":{"rendered":"\n<p> Data Center, Specialist (JNCIS-DC) :<a href=\"https:\/\/www.killtest.cn\/JNCIS-DC\/JN0-480.asp\">JN0-480<\/a><\/p>\n\n\n\n<p>1.You want to make a widget appear on the main dashboard in Juniper Apstra. In this scenario, which<br>\nstatement is correct?<br>\nA. When creating the widget, select the Add to Blueprint Dashboard option.<br>\nB. On the blueprint dashboard, click on the Add Widget option.<br>\nC. Widgets automatically appear on the blueprint dashboard.<br>\nD. Set the Default toggle switch to On for the desired widget.<br>\n\u54ea\u500b\u624d\u662f\u6b63\u78ba\u7b54\u6848<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u7684\u74b0\u5883\u4e2d\uff0c\u8981\u8b93\u4e00\u500b\u5c0f\u5de5\u5177\uff08widget\uff09\u51fa\u73fe\u5728\u4e3b\u5100\u8868\u677f\uff08main dashboard\uff09\u4e0a\uff0c\u6b63\u78ba\u7684\u505a\u6cd5\u662f\uff1a<\/p>\n\n\n\n<p>B. On the blueprint dashboard, click on the Add Widget option.<\/p>\n\n\n\n<p>\u9019\u610f\u5473\u8457\u5728\u85cd\u5716\u5100\u8868\u677f\u4e0a\uff0c\u4f60\u9700\u8981\u9ede\u64ca\u300c\u65b0\u589e\u5c0f\u5de5\u5177\u300d\u7684\u9078\u9805\u4f86\u5c07\u5c0f\u5de5\u5177\u65b0\u589e\u5230\u5100\u8868\u677f\u4e0a\u3002\u5176\u4ed6\u9078\u9805\u8981\u4e48\u4e0d\u6e96\u78ba\uff0c\u8981\u4e48\u8207\u6dfb\u52a0\u5c0f\u90e8\u4ef6\u5230\u5100\u8868\u677f\u7684\u6d41\u7a0b\u4e0d\u7b26\u3002<\/p>\n\n\n\n<p>2.Which statement is true when onboarding a Juniper Networks device using a Juniper Apstra ZTP<br>\nserver?<br>\nA. The Device Key lo be used can be set In the dhcpd.conf file on the ZTP server.<br>\nB. The State can be set In the ztp.Json file on the ZTP server.<br>\nC. The Management IP address cannot be predetermined.<br>\nD. The Hostname will be the serial-number of the device.<br>\n\u6b63\u78ba\u7b54\u6848\u662f\u54ea\u4e00\u500b<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u4f7f\u7528 ZTP \u4f3a\u670d\u5668\u9032\u884c\u8a2d\u5099\u4e0a\u96fb\uff08onboard\uff09\u6642\uff0c\u6b63\u78ba\u7684\u6558\u8ff0\u662f\uff1a<\/p>\n\n\n\n<p>B. The State can be set in the ztp.json file on the ZTP server.<\/p>\n\n\n\n<p>\u6839\u64da\u641c\u5c0b\u7d50\u679c\u4e2d\u7b2c\u56db\u7bc7\u6587\u7ae0\u7684\u63cf\u8ff0\uff0cZTP \u4f3a\u670d\u5668\u4e0a\u7684 ztp.json \u6a94\u6848\u53ef\u4ee5\u7528\u4f86\u8a2d\u5b9a\u88dd\u7f6e\u7684\u72c0\u614b\u3002\u5176\u4ed6\u9078\u9805\u5728\u63d0\u4f9b\u7684\u8cc7\u6599\u4e2d\u6c92\u6709\u76f8\u61c9\u7684\u4f9d\u64da\u3002<\/p>\n\n\n\n<p>3.Using the Juniper Apstra multitenancy capabilities, which approach will allow a tenant to interconnect<br>\ntwo different routing zones?<br>\nA. Interconnection is the default behavior.<br>\nB. Use interconnection through the fabric spine nodes.<br>\nC. Interconnection cannot be enabled.<br>\nD. Use interconnection through an external gateway.<br>\n\u6b63\u78ba\u7b54\u6848\u662f\u54ea\u4e00\u500b<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u7684\u591a\u79df\u6236\uff08multitenancy\uff09\u80fd\u529b\u4e2d\uff0c\u5141\u8a31\u4e00\u500b\u79df\u6236\uff08tenant\uff09\u9023\u63a5\u5169\u500b\u4e0d\u540c\u7684\u8def\u7531\u5340\u57df\uff08routing zones\uff09\u7684\u65b9\u6cd5\u662f\uff1a<\/p>\n\n\n\n<p>B. Use interconnection through the fabric spine nodes.<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u4e2d\uff0c\u901a\u5e38\u4f7f\u7528\u7db2\u8def\u7684\u810a\u7bc0\u9ede\uff08fabric spine nodes\uff09\u4f86\u5be6\u73fe\u4e0d\u540c\u8def\u7531\u5340\u57df\u4e4b\u9593\u7684\u4e92\u9023\u3002\u810a\u7bc0\u9ede\u662f\u7db2\u8def\u4e2d\u7684\u6838\u5fc3\u90e8\u5206\uff0c\u901a\u5e38\u7528\u65bc\u9023\u63a5\u4e0d\u540c\u7684\u7db2\u8def\u5340\u57df\u6216\u79df\u6236\u7a7a\u9593\u3002\u5176\u4ed6\u9078\u9805\u8981\u4e48\u6c92\u6709\u63d0\u4f9b\u8db3\u5920\u7684\u4fe1\u606f\uff0c\u8981\u4e48\u8207 Apstra \u7684\u64cd\u4f5c\u4e0d\u7b26\u3002<\/p>\n\n\n\n<p>4.IBA probes analyze telemetry data from specified devices within a blueprint.<br>\nWhich component Identities devices that supply data tor a specific probe?<br>\nA. data selector<br>\nB. processor<br>\nC. search engine<br>\nD. graph query<br>\n\u6b63\u78ba\u7b54\u6848<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u7684 IBA\uff08Infrastructure Behavior Analytics\uff09\u63a2\u91dd\u5206\u6790\u6307\u5b9a\u8a2d\u5099\u5167\u7684\u9059\u6e2c\u8cc7\u6599\u6642\uff0c\u7528\u65bc\u8b58\u5225\u63d0\u4f9b\u7279\u5b9a\u63a2\u91dd\u8cc7\u6599\u7684\u8a2d\u5099\u5143\u4ef6\u662f\uff1a<\/p>\n\n\n\n<p>A. data selector<\/p>\n\n\n\n<p>\u8cc7\u6599\u9078\u64c7\u5668\uff08data selector\uff09\u8ca0\u8cac\u6c7a\u5b9a\u54ea\u4e9b\u8a2d\u5099\u7684\u8cc7\u6599\u5c07\u88ab\u7279\u5b9a\u63a2\u91dd\u6240\u5206\u6790\u3002\u5176\u4ed6\u9078\u9805\uff0c\u5982\u8655\u7406\u5668\uff08processor\uff09\u3001\u641c\u5c0b\u5f15\u64ce\uff08search engine\uff09\u548c\u5716\u5f62\u67e5\u8a62\uff08graph query\uff09\u96d6\u7136\u5728\u8cc7\u6599\u8655\u7406\u548c\u5206\u6790\u4e2d\u53ef\u80fd\u767c\u63ee\u4f5c\u7528\uff0c\u4f46\u5728\u9019\u7a2e\u60c5\u6cc1\u4e0b\uff0c\u8cc7\u6599\u9078\u64c7\u5668\u662f\u76f4\u63a5\u8207\u8b58\u5225\u8cc7\u6599\u4f86\u6e90\u8a2d\u5099\u76f8\u95dc\u7684\u7d44\u4ef6\u3002<\/p>\n\n\n\n<p>5.What is the purpose of an interface map in Juniper Apstra?<br>\nA. An interface map associates a logical device with a device profile.<br>\nB. An interface map specifies a connection between the interfaces of two devices.<br>\nC. An interface map specifies the number of ports and the port speeds of a logical device<br>\nD. An interface map specifies the connections between racks in a template.<\/p>\n\n\n\n<p>\u6b63\u78ba\u7b54\u6848\u662f\uff1a<\/p>\n\n\n\n<p>A. An interface map associates a logical device with a device profile.<\/p>\n\n\n\n<p>\u6839\u64da\u641c\u5c0b\u7d50\u679c\u4e2d\u7b2c13\u7bc7\u6587\u7ae0\u7684\u63cf\u8ff0\uff0c\u4ecb\u9762\u5716\uff08interface map\uff09\u662f\u7531\u7528\u65bc\u5be6\u73fe\u9810\u671f\u7db2\u8def\u914d\u7f6e\u6e32\u67d3\u7684\u4ecb\u9762\u7d44\u6210\uff0c\u5b83\u5011\u6620\u5c04\u908f\u8f2f\u8a2d\u5099\u8207\u5be6\u9ad4\u786c\u9ad4\u8a2d\u5099\u4e4b\u9593\u7684\u4ecb\u9762\uff08\u4ee5\u8a2d\u5099\u8a2d\u5b9a\u6a94\u8868\u793a\uff09\uff0c\u540c\u6642\u9075\u5b88\u4f9b\u61c9\u5546\u898f\u683c\u3002\u9019\u8868\u793a\u4ecb\u9762\u5716\u5c07\u908f\u8f2f\u8a2d\u5099\u8207\u8a2d\u5099\u8a2d\u5b9a\u6a94\uff08\u53ef\u4ee5\u8996\u70ba\u8a2d\u5099\u7684\u4e00\u7a2e\u5c6c\u6027\u6216\u6982\u8981\uff09\u95dc\u806f\u8d77\u4f86\u3002\u5176\u4ed6\u9078\u9805\u6240\u63cf\u8ff0\u7684\u529f\u80fd\u5728\u63d0\u4f9b\u7684\u8cc7\u6599\u4e2d\u6c92\u6709\u5c0d\u61c9\u7684\u4f9d\u64da\u3002<\/p>\n\n\n\n<p>6.You have a virtual network that needs controlled access to other virtual networks in the same routing<br>\nzone.<br>\nUsing the Juniper Apstra Ul. which feature would be used to accomplish this task?<br>\nA. interface policy<br>\nB. anti-affinity policy<br>\nC. routing policy<br>\nD. security policy<\/p>\n\n\n\n<p>\u6b63\u78ba\u7b54\u6848\u662f\uff1a<br>\nD. security policy<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u4e2d\uff0c\u5b89\u5168\u6027\u539f\u5247\uff08security policy\uff09\u7528\u65bc\u63a7\u5236\u865b\u64ec\u7db2\u8def\u4e4b\u9593\u7684\u8a2a\u554f\uff0c\u78ba\u4fdd\u4e00\u500b\u865b\u64ec\u7db2\u8def\u53ef\u4ee5\u5b89\u5168\u5730\u9023\u63a5\u5230\u5176\u4ed6\u865b\u64ec\u7db2\u8def\u3002\u5b89\u5168\u6027\u7b56\u7565\u5b9a\u7fa9\u4e86\u7db2\u8def\u4e2d\u7684\u5b58\u53d6\u63a7\u5236\u898f\u5247\uff0c\u5305\u62ec\u54ea\u4e9b\u7aef\u9ede\u53ef\u4ee5\u901a\u8a0a\u4ee5\u53ca\u5728\u4ec0\u9ebc\u689d\u4ef6\u4e0b\u53ef\u4ee5\u901a\u8a0a\u3002\u5176\u4ed6\u9078\u9805\uff0c\u5982\u4ecb\u9762\u7b56\u7565\uff08interface policy\uff09\u3001\u53cd\u95dc\u806f\u6027\u7b56\u7565\uff08anti-affinity policy\uff09\u548c\u8def\u7531\u7b56\u7565\uff08routing policy\uff09\uff0c\u96d6\u7136\u4e5f\u662f\u7db2\u8def\u8a2d\u8a08\u4e2d\u7684\u91cd\u8981\u65b9\u9762\uff0c\u4f46\u5b83\u5011\u4e0d\u76f4\u63a5\u7528\u65bc\u63a7\u5236\u865b\u64ec\u7db2\u8def\u4e4b\u9593\u7684\u8a2a\u554f\u3002<\/p>\n\n\n\n<p>7.You want to keep virtual networks isolated from each other within the Juniper Apstra system.<br>\nIn this scenario, what are three ways to accomplish this task? (Choose three.)<br>\nA. Disable IPv4 connectivity when creating the virtual network within the same Routing Zone.<br>\nB. Enable Security Policy for virtual networks in the same Routing Zone.<br>\nC. Disable Route Target exports when creating the Routing Zones.<br>\nD. Use Connectivity Templates to block access within the same Routing Zone.<br>\nE. Put each network in different Routing Zones.<br>\n\u6b63\u78ba\u7b54\u6848<\/p>\n\n\n\n<p>\u5728 Juniper Apstra \u7cfb\u7d71\u4e2d\uff0c\u8981\u8b93\u865b\u64ec\u7db2\u8def\u5f7c\u6b64\u9694\u96e2\uff0c\u53ef\u4ee5\u63a1\u7528\u4ee5\u4e0b\u4e09\u7a2e\u65b9\u5f0f\uff1a<\/p>\n\n\n\n<p>B. Enable Security Policy for virtual networks in the same Routing Zone.<br>\n\u555f\u7528\u5b89\u5168\u6027\u7b56\u7565\u53ef\u4ee5\u63a7\u5236\u540c\u4e00\u8def\u7531\u5340\u57df\u5167\u4e0d\u540c\u865b\u64ec\u7db2\u8def\u4e4b\u9593\u7684\u8a2a\u554f\uff0c\u5f9e\u800c\u5be6\u73fe\u9694\u96e2\u3002<\/p>\n\n\n\n<p>C. Disable Route Target exports when creating the Routing Zones.<br>\n\u505c\u7528\u8def\u7531\u76ee\u6a19\uff08Route Target\uff09\u7684\u532f\u51fa\u53ef\u4ee5\u9632\u6b62\u4e0d\u540c\u865b\u64ec\u7db2\u8def\u4e4b\u9593\u7684\u8def\u7531\u8cc7\u8a0a\u4ea4\u63db\uff0c\u6709\u52a9\u65bc\u4fdd\u6301\u5b83\u5011\u4e4b\u9593\u7684\u9694\u96e2\u3002<\/p>\n\n\n\n<p>E. Put each network in different Routing Zones.<br>\n\u5c07\u6bcf\u500b\u7db2\u8def\u653e\u5728\u4e0d\u540c\u7684\u8def\u7531\u5340\u57df\u662f\u5be6\u73fe\u7db2\u8def\u9694\u96e2\u7684\u76f4\u63a5\u65b9\u6cd5\uff0c\u56e0\u70ba\u8def\u7531\u5340\u57df\u662f\u908f\u8f2f\u4e0a\u7684\u5206\u9694\uff0c\u53ef\u4ee5\u9650\u5236\u4e0d\u540c\u5340\u57df\u9593\u7684\u8def\u7531\u50b3\u64ad\u3002<\/p>\n\n\n\n<p>\u9078\u9805 A &#8220;Disable IPv4 connectivity when creating the virtual network within the same Routing Zone&#8221; \u4e26\u4e0d\u662f\u4e00\u500b\u6a19\u6e96\u7684\u9078\u9805\uff0c\u56e0\u70ba\u901a\u5e38\u865b\u64ec\u7db2\u8def\u7684\u5275\u5efa\u4e0d\u6d89\u53ca\u7981\u7528 IPv4 \u9023\u63a5\u6027\uff0c\u800c\u662f\u900f\u904e\u5176\u4ed6\u65b9\u6cd5\u63a7\u5236\u5b58\u53d6\u3002<\/p>\n\n\n\n<p>\u9078\u9805 D &#8220;Use Connectivity Templates to block access within the same Routing Zone&#8221; \u4e5f\u4e0d\u662f\u4e00\u500b\u6a19\u6e96\u7684\u9694\u96e2\u65b9\u6cd5\uff0c\u9023\u63a5\u6a21\u677f\uff08Connectivity Templates\uff09\u901a\u5e38\u7528\u65bc\u5b9a\u7fa9\u7db2\u8def\u4e2d\u8a2d\u5099\u9593\u7684\u9023\u63a5\u65b9\u5f0f\uff0c\u800c\u4e0d\u662f\u7528\u4f86\u963b\u6b62\u5b58\u53d6\u3002<\/p>\n\n\n\n<p>8.Which fabric type should be chosen in a template to create a five-stage Clos?<br>\nA. collapsed<br>\nB. circuit switched<br>\nC. rack-based<br>\nD. pod-based<br>\n\u54ea\u500b\u624d\u662f\u6b63\u78ba\u7b54\u6848<\/p>\n\n\n\n<p>\u5728\u50cf Juniper Apstra \u9019\u6a23\u7684\u7db2\u8def\u81ea\u52d5\u5316\u5e73\u53f0\u4e2d\uff0c\u5efa\u7acb\u4e00\u500b\u4e94\u968e\u6bb5 Clos \u7db2\u8def\u6a21\u677f\u6642\uff0c\u6b63\u78ba\u7684\u9078\u64c7\u662f\uff1a<\/p>\n\n\n\n<p>D. pod-based<\/p>\n\n\n\n<p>Clos \u7db2\u8def\u8a2d\u8a08\u901a\u5e38\u5206\u70ba\u4e09\u500b\u4e3b\u8981\u5c64\u6b21\uff1a\u5b58\u53d6\u5c64\u3001\u805a\u5408\u5c64\u548c\u6838\u5fc3\u5c64\u3002\u5728 Juniper Apstra \u4e2d\uff0cpod-based \u67b6\u69cb\u662f\u4e00\u7a2e\u5e38\u898b\u7684\u65b9\u6cd5\uff0c\u5b83\u5141\u8a31\u7db2\u8def\u8a2d\u8a08\u8005\u5c07\u7db2\u8def\u5283\u5206\u70ba\u591a\u500b\u8f03\u5c0f\u7684\u3001\u53ef\u7ba1\u7406\u7684\u55ae\u5143\uff0c\u9019\u4e9b\u55ae<\/p>\n\n\n\n<p>\u5143\u53ef\u4ee5\u7368\u7acb\u64f4\u5c55\u548c\u7ba1\u7406\uff0c\u540c\u6642\u4fdd\u6301\u6574\u500b\u7db2\u8def\u7684\u4e00\u81f4\u6027\u548c\u6548\u80fd\u3002 Pod-based \u67b6\u69cb\u53ef\u4ee5\u5f88\u597d\u5730\u9069\u7528\u65bc\u591a\u968e\u6bb5 Clos \u7db2\u8def\u8a2d\u8a08\uff0c\u56e0\u70ba\u5b83\u5141\u8a31\u5728\u6bcf\u500b pod \u4e2d\u5be6\u73fe Clos \u6a21\u578b\u7684\u5404\u500b\u968e\u6bb5\u3002<\/p>\n\n\n\n<p>\u9078\u9805 A\uff08collapsed\uff09\u901a\u5e38\u6307\u7684\u662f\u4e00\u7a2e\u7db2\u8def\u8a2d\u8a08\uff0c\u5176\u4e2d\u5b58\u53d6\u5c64\u548c\u805a\u5408\u5c64\u5408\u4f75\u70ba\u4e00\u500b\u5c64\uff0c\u9019\u4e0d\u7b26\u5408\u4e94\u968e\u6bb5 Clos \u7684\u8981\u6c42\u3002\u9078\u9805 B\uff08circuit switched\uff09\u6307\u7684\u662f\u96fb\u8def\u4ea4\u63db\u7db2\u7d61\uff0c\u8207 Clos \u7db2\u8def\u7684\u8a2d\u8a08\u7121\u95dc\u3002\u9078\u9805 C\uff08rack-based\uff09\u901a\u5e38\u6307\u7684\u662f\u57fa\u65bc\u6a5f\u67b6\u7684\u7db2\u8def\u8a2d\u5099\u90e8\u7f72\uff0c\u96d6\u7136\u5b83\u53ef\u80fd\u8207 Clos \u7db2\u8def\u7684\u8a2d\u8a08\u6709\u95dc\uff0c\u4f46\u5728 Juniper Apstra \u7684\u4e0a\u4e0b\u6587\u4e2d\uff0cpod-based \u662f\u66f4\u6e96\u78ba\u7684\u9078\u64c7\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Center, Specialist (JNCIS-DC) :JN0-480 1.You want to make a widget appear on the main dashboard in Juniper Apstra. In this scenario, which statement is correct? A. When creating the widget, select the Add to Blueprint Dashboard option. B. On the blueprint dashboard, click on the Add Widget option. C. Widgets automatically appear on the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13602","post","type-post","status-publish","format-standard","hentry","category-killtest"],"_links":{"self":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/13602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13602"}],"version-history":[{"count":1,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/13602\/revisions"}],"predecessor-version":[{"id":13603,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/13602\/revisions\/13603"}],"wp:attachment":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}