[Free] Download New Latest (November) Juniper JN0-380 Actual Tests 11-20

Ensurepass

QUESTION 11

You want to copy 802.11 protocol messages from the RF channel to a specified observer running a protocol analyzer.

 

Which WLC feature would you use?

 

A.

IGMP

B.

RF Snoop

C.

trace

D.

RF ping

 

Answer: B

 

 

QUESTION 12

What are two advantages of using a locally switched data forwarding model? (Choose two.)

 

A.

decreased latency

B.

no AP licenses needed

 

 

 

 

C.

increased coverage area

D.

decreased jitter

 

Answer: AD

 

 

QUESTION 13

You want to perform an initial configuration of the WLC.

 

In the CLI, which command would you use?

 

A.

quickstart

B.

webstart

C.

kickstart

D.

faststart

 

Answer: A

 

 

QUESTION 14

A customer is deploying a guest access network for visitors. They would like to have guest users log in to the network prior to gaining access.

 

What must be set in the service profile configuration?

 

A.

authentication fall through should be configured for Web Portal

B.

a Web authentication rule must be configured

C.

a location policy must be configured for the guest access point

D.

a local user must be defined

 

Answer: A

 

 

QUESTION 15

You are experiencing client connectivity problems on the wireless network.

 

 

 

 

Which two wireless debugging tools would you use? (Choose two.)

 

A.

wireless sniffer

B.

packet injector

C.

spectrum analyzer

D.

signal generator

 

Answer: AC

 

 

QUESTION 16

What is the purpose of the origin point tool?

 

A.

to point on the RF plan where the wiring closet is located

B.

to line up multiple floors within a single building plan

C.

to line up multiple coverage areas across a multi-building campus plan

D.

to determine the starting point of the coverage area

 

Answer: B

 

 

QUESTION 17

What is WEP?

 

A.

WLAN license

B.

WLAN controller (WLC)

C.

WLAN access point (AP)

D.

WLAN encryption

 

Answer: D

 

 

QUESTION 18

You detect wireless clients who are connected to an unauthorized AP on your network.

 

Which setting would you configure to block their access to the network?

 

 

 

 

 

A.

Encryption

B.

Countermeasures

C.

Radio Frequency (RF)

D.

Auto-tuning

 

Answer: B

 

 

QUESTION 19

A customer wants to establish bidirectional trust between the WLC and the RingMaster management system.

 

Which default self-signed certificate on the WLC must be replaced to ensure bidirectional trust?

 

A.

Web-portal certificate

B.

SSH certificate

C.

admin certificate

D.

802.1x certificate

 

A
nswer:
C

 

 

QUESTION 20

A network administrator has deleted the current network plan without saving it first. They are using the RingMaster Web-based management interface to restore a previous plan that was saved automatically.

 

By default, how many previous copies of the plan are available to be restored?

 

A.

24

B.

36

C.

48

D.

60

 

Answer: C

 

Free VCE & PDF File for Juniper JN0-380 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-380 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.