[Free] Download New Latest (November) Juniper JN0-380 Actual Tests 21-30

Ensurepass

QUESTION 21

What is the hardware requirement for a RingMaster client?

 

A.

Intel/AMD x86-compatible dual core processor, 2.0Ghz, 2GB RAM, 512 MB HD space

B.

Intel/AMD x86-compatible single core processor, 2.0Ghz, 2GB RAM, 512 MB HD space

C.

Intel/AMD x86-compatible single core processor, 2.0Ghz, 1GB RAM, 1024 MB HD space

D.

Intel/AMD x86-compatible dual core processor, 1.0Ghz, 1GB RAM, 512 MB HD space

 

Answer: A

 

 

QUESTION 22

Which GUI software is used to plan, configure, and manage WLAN networks?

 

A.

RingMaster

B.

WirelessMaster

C.

AcessPointMaster

D.

WiFiMaster

 

Answer: D

 

 

QUESTION 23

You are implementing user globs to allow access to your network. You want to allow access to users with the username @company.com.

 

Which user glob do you configure?

 

A.

users@company.com

B.

all.users@company.com

C.

*@company.com

D.

*.users@company.com

 

Answer: C

 

 

 

QUESTION 24

You want to provide secure wireless services to one set of clients on your network and allow open access services to your guest clients. You need to configure service profiles for each type of access to the network.

 

Which three methods are used to accomplish this? (Choose three.)

 

A.

Configure one service per WLA.

B.

Configure an encryption type.

C.

Configure IP addresses.

D.

Configure SSIDs.

E.

Configure VLANs.

 

Answer: BDE

 

 

QUESTION 25

Which data forwarding models are supported on Juniper Networks WLANs?

 

A.

inner and outer switching

B.

restricted and unrestricted switching

C.

central and local switching

D.

limited and unlimited switching

 

Answer: D

 

 

QUESTION 26

Your ma
nager asks you to implement a secure SSID that will authenticate users to a Microsoft Active Directory database.

 

What is required to interface between the WLC and the database?

 

A.

TACACS+

B.

RADIUS

C.

Kerberos

D.

802.1x/EAP

 

 

 

 

 

Answer: B

 

 

QUESTION 27

You have an AP at a remote site and must obtain configuration information from a WLC on your network across a WAN link. The remote site uses NAT.

 

Which two UDP ports must be permitted at the NAT boundary to accomplish this?

 

A.

1812

B.

5000

C.

1813

D.

5247

 

Answer: BD

 

 

QUESTION 28

Your manager asks you to verify that all access points in a cluster have a primary and secondary controller assigned.

 

Which CLI command should you use to verify this?

 

A.

show cluster

B.

show ap status

C.

show mobility-domain

D.

show cluster ap

 

Answer: D

 

 

QUESTION 29

What is the maximum allowed configurable SSIDs per radio?

 

A.

8

B.

16

 

 

 

 

C.

32

D.

64

 

Answer: C

 

 

QUESTION 30

You made changes to a few settings on your WLCs in the network plan. However, the changes do not deploy to the network.

 

Where would you view warnings about best-practice violations in the WLC configuration settings?

 

A.

Alarms

B.

Policies

C.

Configuration

D.

Verification

 

Answer: D

 

Free VCE & PDF File for Juniper JN0-380 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-380 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.