New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-214 - Cloud Associate (JNCIA-Cloud)

Page: 2 / 2
Total 65 questions

What are the two characteristics of the Network Functions Virtualization (NFV) framework? (Choose two.)

A.

It implements virtualized tunnel endpoints

B.

It decouples the network software from the hardware.

C.

It implements virtualized network functions

D.

It decouples the network control plane from the forwarding plane.

What is the name of the Docker container runtime?

A.

docker_cli

B.

containerd

C.

dockerd

D.

cri-o

Which two CPU flags indicate virtualization? (Choose two.)

A.

lvm

B.

vmx

C.

xvm

D.

kvm

Which virtualization method requires less duplication of hardware resources?

A.

OS-level virtualization

B.

hardware-assisted virtualization

C.

full virtualization

D.

paravirtualization

Which command should you use to obtain low-level information about Docker objects?

A.

docker info

B.

docker inspect

C.

docker container

D.

docker system

You want to view pods with their IP addresses in OpenShift.

Which command would you use to accomplish this task?

A.

oc qet pods -o vaml

B.

oc get pods -o wide

C.

oc qet all

D.

oc get pods

Which Linux protection ring is the least privileged?

A.

0

B.

1

C.

2

D.

3

Which command would you use to see which VMs are running on your KVM device?

A.

virt-install

B.

virsh net-list

C.

virsh list

D.

VBoxManage list runningvms

Which encapsulation protocol uses tunneling to provide a Layer 2 overlay over an underlying Layer 3 network?

A.

VLAN

B.

IPsec

C.

VXLAN

D.

GRE