New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-252 Questions and Answers

Question # 6

AP is connected lo your wired network but Is not claimed to your organization. Which type of AP would be a possible security threat in this scenario?

A.

neighbor AP

B.

rogue AP

C.

spoofed AP

D.

honeypot AP

Full Access
Question # 7

Which Mist API Is event driven?

A.

FTP

B.

Webhook

C.

Python

D.

RESTful

Full Access
Question # 8

What is used in Wireless Assurance to evaluate Information about possible network faults?

A.

SNMP

B.

tcpdump

C.

syslog analysis

D.

machine learning

Full Access
Question # 9

Exhibit.

..exhibit displays the connection now tot an API interaction sequence ich API type is displayed?

A.

SOAP

B.

Webhook

C.

WebSocket

D.

RESTtuI

Full Access
Question # 10

Which two statements correctly describe the encryption of traffic using Mist? (Choose two.)

A.

By default, the communication between an AP and a RADIUS server is not encrypted.

B.

By default, the communication between a Wi-Fi client and an AP is encrypted.

C.

By default, the communication between an AP and a RADIUS server is encrypted.

D.

By default, the communication between a Wi-Fi client and an AP is not encrypted.

Full Access
Question # 11

Which two statements correctly describe the provisioning of greenfield and brownfieldswitches using the Mist Ul? (Choose two.)

A.

Greenfield switches are provisioned using the Adopt Switches button.

B.

Brownfield switches are provisioned using the Adopt Switches button.

C.

Greenfield switches are provisioned using the Claim Switches button.

D.

Brownfield switches are provisioned using the Claim Switches button.

Full Access
Question # 12

Which statement is correct about Wi-Fi location-based services (LBS)?

A.

Wi-Fi LBS requites me Wireless Assurance subscription.

B.

Wi-Fi LBS needs the User Engagement subscription.

C.

Wi-Fi LBS does not require a subscription.

D.

WI-FI LBS requites a Wired Assurance subscription.

Full Access
Question # 13

Which language Is used to execute Marvis queries in the Mist Ul?

A.

Natural Language

B.

Python

C.

C++

D.

Structured Query Language (SOL)

Full Access
Question # 14

Which step must you take when configuring rogue AP detection?

A.

Enable rogue AP detection.

B.

Set the proximity zones.

C.

Disable honeypot detection.

D.

Set the Radio Resource Management (RRM) interval.

Full Access
Question # 15

The MistUl. what are two Marvis Actions tor the AP category? (Choose two.)

A.

High CPU

B.

MTU Mismatch

C.

Coverage Hole

D.

Health Check Failed

Full Access
Question # 16

ten protocol is used by Mist lo monitor non-Juniper switches?

A.

LLDP

B.

IPsec

C.

SNMP

D.

SMTP

Full Access
Question # 17

Which three components ate used to deploy location-based services? (Choose three.)

A.

location sensors

B.

BLE tags

C.

compact flash

D.

location engine

E.

SFP

Full Access
Question # 18

Which two statements correctly describe Mist organizations and sites? (Choose wo.)

A.

A site is contained within an organization.

B.

Multiple sites may be contained within a single organization.

C.

An organization is contained within a site.

D.

Multiple organizations may be contained within a single site.

Full Access
Question # 19

Which Radio Resource Management (RRM) changes are only made once a day between 2:00 AM and 3:00 AM local time?

A.

channel and power settings across a site based on long-term statistics and baselines

B.

RF template changes to channel width

C.

channel and power level changes triggered by SSID scheduling

D.

channel and power level changes triggered by DFS events

Full Access