Developing SQL Databases (beta) Exam 70-762

Published: August 26, 2016
Languages: English
Audiences: Developers
Technology: SQL Server
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design and implement database objects (25–30%)
Design and implement a relational database schema
Design tables and schemas based on business requirements, improve the design of tables by using normalization, write table create statements, determine the most efficient data types to use
Design and implement indexes
Design new indexes based on provided tables, queries, or plans; distinguish between indexed columns and included columns; implement clustered index columns by using best practices; recommend new indexes based on query plans
Design and implement views
Design a view structure to select data based on user or business requirements, identify the steps necessary to design an updateable view, implement partitioned views, implement indexed views
Implement columnstore indexes
Determine use cases that support the use of columnstore indexes, identify proper usage of clustered and non-clustered columnstore indexes, design standard non-clustered indexes in conjunction with clustered columnstore indexes, implement columnstore index maintenance

Implement programmability objects (20–25%)
Ensure data integrity with constraints
Define table and foreign key constraints to enforce business rules, write Transact-SQL statements to add constraints to tables, identify results of Data Manipulation Language (DML) statements given existing tables and constraints, identify proper usage of PRIMARY KEY constraints
Create stored procedures
Design stored procedure components and structure based on business requirements, implement input and output parameters, implement table-valued parameters, implement return codes, streamline existing stored procedure logic, implement error handling and transaction control logic within stored procedures
Create triggers and user-defined functions
Design trigger logic based on business requirements; determine when to use Data Manipulation Language (DML) triggers, Data Definition Language (DDL) triggers, or logon triggers; recognize results based on execution of AFTER or INSTEAD OF triggers; design scalar-valued and table-valued user-defined functions based on business requirements; identify differences between deterministic and non-deterministic functions

Manage database concurrency (25–30%)
Implement transactions
Identify DML statement results based on transaction behavior, recognize differences between and identify usage of explicit and implicit transactions, implement savepoints within transactions, determine the role of transactions in high-concurrency databases
Manage isolation levels
Identify differences between Read Uncommitted, Read Committed, Repeatable Read, Serializable, and Snapshot isolation levels; define results of concurrent queries based on isolation level; identify the resource and performance impact of given isolation levels
Optimize concurrency and locking behavior
Troubleshoot locking issues, identify lock escalation behaviors, capture and analyze deadlock graphs, identify ways to remediate deadlocks
Implement memory-optimized tables and native stored procedures
Define use cases for memory-optimized tables versus traditional disk-based tables, optimize performance of in-memory tables by changing durability settings, determine best case usage scenarios for natively compiled stored procedures, enable collection of execution statistics for natively compiled stored procedures

Optimize database objects and SQL infrastructure (20–25%)
Optimize statistics and indexes
Determine the accuracy of statistics and the associated impact to query plans and performance, design statistics maintenance tasks, use dynamic management objects to review current index usage and identify missing indexes, consolidate overlapping indexes
Analyze and troubleshoot query plans
Capture query plans using extended events and traces, identify poorly performing query plan operators, create efficient query plans using Query Store, compare estimated and actual query plans and related metadata, configure Azure SQL Database Performance Insight
Manage performance for database instances
Manage database workload in SQL Server; design and implement Elastic Scale for Azure SQL Database; select an appropriate service tier or edition; optimize database file and tempdb configuration; optimize memory configuration; monitor and diagnose scheduling and wait statistics using dynamic management objects; troubleshoot and analyze storage, IO, and cache issues; monitor Azure SQL Database query plans
Monitor and trace SQL Server baseline performance metrics
Monitor operating system and SQL Server performance metrics; compare baseline metrics to observed metrics while troubleshooting performance issues; identify differences between performance monitoring and logging tools, such as perfmon and dynamic management objects; monitor Azure SQL Database performance; determine best practice use cases for extended events; distinguish between Extended Events targets; compare the impact of Extended Events and SQL Trace; define differences between Extended Events Packages, Targets, Actions, and Sessions

QUESTION: No: 01
You are experiencing performance issues with the database server.
You need to evaluate schema locking issues, plan cache memory pressure points, and backup I/O
problems.
What should you create?

A. a System IV|onitor report
B. a sys.dm_exec_query_stats dynamic management view query
C. a sys.dm_exec_session_wait_stats dynamic management view query
D. an ActMty Monitor session in Microsoft SQL Management Studio.

Answer:


QUESTION: No: 02
You are developing an application to track customer sales.
You need to create a database object that meets the following requirements:
-Return a value of 0 if data inserted successfully into the Customers table.
-Return a value of 1 if data is not inserted successfully into the Customers table.
-Support logic that is written by using managed code.
What should you create’?

A. extended procedure
B. CLR procedure
C. user-defined procedure
D. DML trigger
E. DDL trigger
F. scalar-valued function
G. table-valued function

Answer:


QUESTION: No: 03
You are developing an application to track customer sales.
You need to create a database object that meets the following requirements:
-Return a value of 0 if data inserted successfully into the Customers table.
-Return a value of 1 if data is not inserted successfully into the Customers table.
-Support TRY CATCH error handling
– Be written by using Transact-SOL statements.
What should you create?

A. extended procedure
B. CLR procedure
C. user-defined procedure
D. DML trigger
E. scalar-valued function
F. table-valued function

Answer:


QUESTION: No: 04
You are developing an application to track customer sales.
You need to create a database object that meets the following requirements:
– Launch when table data is modified.
– Evaluate the state a table before and after a data modification and take action based on the difference.
– Prevent malicious or incorrect table data operations.
– Prevent changes that violate referential integrity by cancelling the attempted data modification.
-Run managed code packaged in an assembly that is created in the Microsoft.NET Framework and
located into Microsoft SQL Server.
What should you create?

A. extended procedure
B. CLR procedure
C. user-defined procedure
D. DML trigger
E. scalar-valued function
F. table-valued function

Answer:


QUESTION: No: 05
You are developing and application to track customer sales.
You need to return the sum of orders that have been finalized, given a specified order identifier. This
value will be used in other Transact-SOL statements.
You need to create a database object.
What should you create?

A. extended procedure
B. CLR procedure
C. user-defined procedure
D. DML trigger
E. scalar-valued function
F. table-valued function

Answer:
 

Click here to view complete Q&A of 70-762 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-762 Training at certkingdom.com

1Z0-066 Oracle Database 12c: Data Guard Administration

1Z0-066 Oracle Database 12c: Data Guard Administration

Oracle Data Guard Basics
Describe the Architecture of Oracle Data Guard
Explain the applicability between physical and logical standby and snapshot databases
Explain the benefits of implementing Oracle Data Guard
Explain Data Guard use with the Oracle Multi-tennant databases

Creating a Physical Standby Database by Using Enterprise Manager Cloud Control
Create a Data Guard broker configuration
Create a physical standby database
Verify a Data Guard configuration
Edit database properties related to Data Guard
Test a Data Guard configuration

Managing Oracle Net Services in a Data Guard Environment
Configure client connectivity in a Data Guard configuration
Implement failover procedures to automatically redirect clients to a new primary database
Using Application Continuity in a Data Guard Environment

Creating a Physical Standby Database by Using SQL and RMAN Commands
Configure the primary database and Oracle Net Services to support the creation of the physical standby database and role transition
Create a physical standby database by using the DUPLICATE TARGET DATABASE FOR STANDBY FROM ACTIVE DATABASE RMAN command

Using Oracle Active Data Guard
Use Real-time Query to access data on a physical standby database
Enable RMAN block change tracking for a physical standby database
Use Far Sync to extend zero data loss protection for intercontinental configurations
Using Temporary Undo. Global Sequences and Session Sequences
Using Automatic Block Media Recovery
Configure Real-Time Cascading

Creating and Managing a Snapshot Standby Database
Create a snapshot standby database to meet the requirement for a temporary, updatable snapshot of a physical standby database
Convert a snapshot standby database back to a physical standby database

Creating a Logical Standby Database
Determine when to create a logical standby database
Create a logical standby database
Manage SQL Apply filtering

Oracle Data Guard Broker Basics
Describe the Data Guard broker architecture
Describe the Data Guard broker components
Explain the benefits of the Data Guard broker
Describe Data Guard broker configurations

Creating a Data Guard Broker Configuration
Create a Data Guard broker configuration
Manage the Data Guard broker configuration

Monitoring a Data Guard Broker Configuration
Use Enterprise Manager to manage your Data Guard configuration
Invoke DGMGRL to manage your Data Guard configuration

Configuring Data Protection Modes
Describe the data protection modes
Change the data protection mode of your configuration

Performing Role Transitions
Explain the database roles
Perform a switchover
Perform a failover

Using Flashback Database in a Data Guard Configuration
Configure Flashback Database
Explain the advantages of using Flashback Database in a Data Guard configuration

Enabling Fast-Start Failover
Configure fast-start failover
View information about the fast-start failover configuration
Manage the observer
Perform role changes in a fast-start failover configuration
Manually reinstate the primary database

Backup and Recovery Considerations in an Oracle Data Guard Configuration
Use Recovery Manager (RMAN) to back up and restore files in a Data Guard configuration
Offload backups to a physical standby database
Recovering databases in a Data Guard Environment
Managing Archive Redo Logs in a Data Guard Environment

Patching and Upgrading Databases in a Data Guard Configuration
Patch and upgrade databases using traditional patch methods
Perform rolling upgrades

Optimizing a Data Guard Configuration
Monitor configuration performance
Optimize redo transport for best performance
Optimize SQL Apply


QUESTION: No: 1
Which two statements are true for Data Guard environments with multi-tenant databases?

A. DB_UNIQUE_NAME must be specified differently for each pluggable database within a multitenant
standby database.
B. Each pluggable database within a multi-tenant physical standby database has a minimum of one
associated Oracle Net service name.
C. Each pluggable database within a multi-tenant physical standby has one MRP background process
running during redo apply.
D. A pluggable database within a multi-tenant standby database can have a different open mode than the
container database
E. A pluggable database within a multi-tenant standby database can have a different database role than
the container database.

Answer: A, D


QUESTION: No: 2
Your Data Guard environment has two remote physical standby databases Client applications use the
local naming method to connect to the primary database instance.
You want applications to automatically connect to the new primary database instance in case of a
switchover or a failover
Which will fulfill this requirement?

A. Create a database service on each standby database that is started automatically by a trigger, when
the database rote is PRIMARY, modify the connection description used by client applications to include all
the standby hosts and connect to the database instance using that service name.
B. Create a database service on the primary database that is started automatically by a trigger, when the
database role is PRIMARY, modify the connection descriptors used by client applications to include all the
standby hosts and connect to the database instance using that service name.
C. Set the INSTANCE_NAME parameter identically on all databases; modify the connection descriptor on
client applications to include all the standby hosts and connect to the database instance using that service
name.c
D. Set the DB_NAME and DB_UNIQUE_NAME identical on all databases, modify the connection
descriptors on client applications to include all the standby hosts and connect to the database using that
service name.

Answer: A


QUESTION: No: 3
Examine the Data Guard configuration:
DGMGRL >show configuration;
Configuration-Animals
Protection Mode MaxPerformance Databases
dogs-Primary database
sheep-Snapshot standby database
cats-Snapshot standby database
Fast-Start Failover: DISABLED
Configuration Status: SUCCESS
You receive an error while attempting to raise the protection mode to Maximum Availability:
DGMGDRL> edit configuration set protection mode as max availability;
Error ORA-16627 operation disallowed since no standby databases would remain to support protection
mode Failed.
Identify two statements that you can execute, either one of which will enable successful raising of the
protection mode to Maximum Availability.

A. DGMGRL> convert database sheep to physical standby;
B. DGMGRL> convert database cats to physical standby;
C. DGMGRL> edit database dogs set property LogXptMode= fastsync;
D. DGMGRL> edit database sheep set property LogXptMode= fastsync;
E. DGMGRL> edit database cats set property LogXptMode= sync;

Answer: B, E


QUESTION: No: 4
You administer a Data Guard environment with a primary and two physical standby databases.
One of the physical standby databases is used for reporting and is on the same host as the primary
database.
The other physical standby database is remote, used for disaster recovery and REDO is routed to it via a
far sync instance.
Backups are offloaded to the remote physical standby.
Which three are true concerning the management of archive logs in this Data Guard configuration?

A. Archive logs on the primary database may be deleted once they are applied on all standby databases.
B. Archive logs on the primary database may be deleted once they are shipped on all standby databases.
C. The deletion policy for archive logs on the remote physical standby should be set so that archived logs
are deleted once they backed up at least once on the remote physical standby database.
D. The deletion policy for archive logs on the remote physical standby should be set so that archived logs
are deleted once they are applied on all standby databases.
E. Archive logs on the primary database may be deleted once they are archived locally to disk.

Answer: A, D, E


QUESTION: No: 5
Which two are prerequisites for configuring flashback database for Oracle 12c databases, in a Data
Guard environment?

A. a flash recovery area must be configured
B. The database must be in MOUNT state.
C. The database must be in ARCHIVELOG mode.
D. A far sync instance must be configured to flash back a standby when the primary has been flashed back.
E. The Data Guard Broker must be used.

Answer: A, C

Click here to view complete Q&A of 1Z0-066 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-066 Certification, Oracle 1Z0-066 Training at certkingdom.com

JN0-130 Juniper Networks Certified Internet Specialist

JNCIS-E Exam Objectives (Exam: JN0-130)

Advanced Operation, Configuration, and Troubleshooting
Identify the steps required to recover from a corrupted flash drive.
Describe the operation and configuration of NTP.
Define the logging and scripting capabilities of the E-series Router.
Describe the various macros available using the router CLI.
Identify the CLI login security features of the E-series Router.
Describe the steps performed during a Loopback test.
Describe the steps performed during a BERT test.

Interface Configuration
List the steps involved in configuring an ATM interface.
Identify the configuration components for a Frame Relay interface.
Define the configuration process for establishing both VLAN-tagged Ethernet and non-tagged Ethernet interfaces.
List the configuration steps for enabling a channelized interface.

Routing Information Protocol (RIP)
Describe the basic characteristics of the RIP protocol.
Identify the message types used in RIP.
List the CLI commands used to configure and verify RIP.

Open Shortest Path First (OSPF)
Define the functions of the following OSPF packet types: Hello, Database Descriptor, LS Request, LS Update, LS Ack.
Define the functions of the following OSPF area designations and functions: backbone area, non backbone area, stub area, and not-so-stubby area.
Define the functions of the following OSPF router types: backbone, area, ABR, ASBR.
Define the function and default values of the following OSPF timers: the hello interval, LSA transmission and retransmission interval, router dead interval.
Identify the steps required to form an OSPF adjacency.
Identify OSPF authentication types.
Identify the criteria used to choose an OSPF designated router (DR). Further discuss the functions of the DR and BDR.
Identify CLI commands used to configure and troubleshoot an OSPF network.

Intermediate System to Intermediate System (IS-IS)
Define the functions of the following IS-IS PDUs: Hello, Link-State, CSNP, PSNP.
Describe ISO network addressing as it applies to IS-IS.
Describe characteristics of IS-IS adjacencies, as they pertain to L1 and L2.
Define the function and identify the characteristics of the following IS-IS parameters: authentication, mesh groups, wide metrics, LSP lifetime, overload.
Describe the election of the Designated Intermediate System.
Describe interarea routing in IS-IS.
Describe the steps required to configure IS-IS.
Identify CLI commands used to monitor and troubleshoot an IS-IS network.

Border Gateway Protocol (BGP)
Define the functionality of BGP including partial updates, TCP connectivity, and BGP prefixes.
Describe the different BGP neighbor states.
Define the functions of the following BGP packet types: Open, Update, Notification, Keepalive.
Define the functions of the following BGP attributes: Next Hop, Local Preference, AS Path, Origin, MED, Community.
Identify the steps of the BGP Route Selection Algorithm.
Describe the default action for BGP route advertisements to EBGP and IBGP peers.
Define the consequences of BGP route flap damping.
Identify the characteristics of MBGP and list the reasons for enabling multiprotocol BGP.
Identify the use of route maps, prefix lists, and community lists in a BGP environment.
Describe the operation of a BGP confederation network.
Describe the operation of BGP route reflection.
Describe the steps required to configure and troubleshoot BGP.

Broadband Remote Access Services (B-RAS)
Identify configuration and troubleshooting steps involved in operating a Routed 1483 service offering.
Identify configuration and troubleshooting steps involved in operating a Bridged 1483 service offering.
Identify configuration and troubleshooting steps involved in operating a PPP over ATM service offering.
Identify configuration and troubleshooting steps involved in operating a PPP over Ethernet service offering.
Identify configuration and troubleshooting steps involved in using Dynamic Configuration Mode on the E-series Router.

Multiprotocol Label Switching (MPLS)
Define the functions of the following MPLS terms: Label-Switched Path, Label-Switched Router, Ingress, Transit, Penultimate, and Egress.
Identify the format and uses of an MPLS Label.
Define the functions and characteristics of RSVP.
Define the functions of the following RSVP attributes: Strict ERO, Loose ERO, Label Object, Label Request Object, Record-Route, Session Attribute, TSpec.
Describe the operation of LDP.
Define and configure basic MPLS functionality.
Describe the terminology of a BGP MPLS network.
Define the operation of a BP MPLS network.

Miscellaneous Topics
Identify the components of a multicast network.
Define how the E-series Router implements Quality of Service in a network environment.
Describe the applications of policy management on the E-series Router.
Identify the security features of the E-series Router.


QUESTION 1
What are two purposes of the RSVP signaling protocol when configuring MPLS Label-Switched
Paths (LSPs)? (Choose two.)

A. to perform a labelpush operation
B. to track the status of signaled LSPs
C. to perform longest-match route lookups
D. to reserve resources, such as labels and path information

Answer: B,D


QUESTION 2
A Bridged 1483 network is grouping all DSL users into a single logical subnet. Which configuration
command prevents the end users from directly communicating with each other?

A. noip arp
B. noip proxy-arp
C. restrictip arp
D. restrictip proxy-arp

Answer: B


QUESTION 3
Which three BGP attributes are always communicated in a BGP update packet? (Choose three.)

A. MED
B. Origin
C. AS Path
D. Next Hop
E. Aggregator

Answer: B,C,D


QUESTION 4
What is the default Quality of Service traffic class used by the ERX Edge Router?

A. bronze forwarding
B. assured forwarding
C. expedited forwarding
D. best effort forwarding

Answer: D


QUESTION 5
When configuring an explicit path, what does the next-address entry identify?

A. the tunnel end point
B. the tunnel start point
C. a specific node to be traversed
D. the node prior to the tunnel end point

Answer: A

Click here to view complete Q&A of JN0-130 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Juniper JN0-130 Certification, Juniper JN0-130 Training at certkingdom.com

 

JN0-342 Juniper Networks Certified Internet Associate (JNCIA-ER)

JNCIS-SP Exam Objectives (Exam: JN0-360)

Protocol-Independent Routing
Identify the concepts, operation and functionality of various protocol-independent routing components
Static, aggregate, and generated routes
Martian addresses
Routing instances, including RIB groups
Load balancing
Filter-based forwarding
Demonstrate knowledge of how to configure and monitor various protocol-independent routing components
Static, aggregate, and generated routes
Load balancing
Filter-based forwarding

Open Shortest Path First (OSPF)
Identify the concepts, operation and functionality of OSPF
Link-state database
OSPF packet types
Router ID
Adjacencies and neighbors
Designated router (DR) and backup designated router (BDR)
OSPF area and router types
LSA packet types
Demonstrate knowledge of how to configure, monitor and troubleshoot OSPF
Areas, interfaces and neighbors
Additional basic options
Routing policy application
Troubleshooting tools

Intermediate System to Intermediate System (IS-IS)
Identify the concepts, operation and functionality of IS-IS
Link-state database
IS-IS PDUs
TLVs
Levels and areas
Designated intermediate system (DIS)
Metrics
Demonstrate knowledge of how to configure, monitor and troubleshoot OSPF
Areas, interfaces and neighbors
Additional basic options
Routing policy application
Troubleshooting tools

Border Gateway Protocol (BGP)

Identify the concepts, operation and functionality of BGP
BGP basic operation
BGP message types
Attributes
Route/path selection process
IBGP and EBGP functionality and interaction
Demonstrate knowledge of how to configure and monitor BGP
Groups and peers
Additional basic options
Routing policy application

Layer 2 Bridging and VLANs
Identify the concepts, operation, and functionality of Layer 2 bridging for the Junos OS
Service Provider switching platforms
Bridging elements and terminology
Frame processing
Virtual Switches
Provider bridging (e.g., Q-in-Q tunneling)
Identify the concepts, benefits, and functionality of VLANs
Port modes
Tagging
MVRP
IRB
Demonstrate knowledge of how to configure, monitor and troubleshoot Layer 2 bridging and VLANs
Interfaces and ports
VLANs
MVRP
IRB
Provider bridging

Spanning-Tree Protocols
Identify the concepts, benefits, operation, and functionality of Spanning Tree Protocol and its variants
STP, RSTP, MSTP and VSTP concepts
Port roles and states
BPDUs
Convergence and reconvergence
Spanning-tree security
Demonstrate knowledge of how to configure, monitor and troubleshoot STP and its variants
Spanning-tree protocols – STP, RSTP, MSTP, VSTP
BPDU, loop and root protection

Multiprotocol Label Switching (MPLS) and MPLS VPNs
Identify the concepts, operation, and functionality of MPLS
MPLS terminology
MPLS packet header
End-to-end packet flow and forwarding
Labels and the label information base (LIB)
MPLS and routing tables
RSVP
LDP
Identify the concepts, benefits, operation, and functionality of MPLS VPNs
VPN routing tables
Layer 3 VPN terminology and components
BGP Layer 2 VPN terminology and components
LDP Layer 2 circuit terminology and components
Virtual private LAN service (VPLS) terminology and components
MPLS VPN control plane traffic flow
MPLS VPN data plane traffic flow
Demonstrate knowledge of how to configure and monitor MPLS
MPLS forwarding
RSVP-signaled and LDP-signaled LSPs

IPv6
Identify the concepts, operation and functionality of IPv6
IPv4 vs. IPv6
Address types, notation and format
Address scopes
Autoconfiguration
Tunneling
Demonstrate knowledge of how to configure and monitor IPv6
Interfaces
Static routes
Dynamic routing – OSPFv3, IS-IS, BGP
IPv6 over IPv4 tunneling

Tunnels
Identify the concepts, requirements and functionality of IP tunneling
Tunneling applications and considerations
GRE
IP-IP
Demonstrate knowledge of how to configure and monitor IP tunnels
GRE configuration
IP-IP configuration

High Availability

Identify the concepts, benefits, applications and requirements of high availability
Link aggregation groups (LAG) and multichassis LAGs (MC-LAGs)
Graceful restart (GR)
Graceful Routing Engine switchover (GRES)
Nonstop active routing (NSR)
Nonstsop bridging (NSB)
Bidirectional Forwarding Detection (BFD)
Virtual Router Redundancy Protocol (VRRP)
Unified In-Service Software Upgrade (ISSU)
Ethernet Ring Protection (ERP)
Demonstrate knowledge of how to configure and monitor high availability component
LAG, MC-LAG
Additional basic options
GR, GRES, NSR and NSB
VRRP
ISSU


QUESTION 1
Which two statements are true about MPLS VPNs? (Choose two.)

A. With Layer 3 VPNs, the provider’s routers participate in the customer’s Layer 3 routing.
B. MPLS VPNs are designed to run over private networks rather than the public Internet.
C. With Layer 2 VPNs, the provider does not participate in the routing of the customer’s private IP
traffic.
D. MPLS VPN tunnels are always encrypted.

Answer: A,C

Explanation:


QUESTION 2
Which label operation is performed by an MPLS transit router?

A. inject
B. pop
C. push
D. swap

Answer: D

Explanation: https:://www.juniper.net/techpubs/software/junos-security/junos-security96/junossecurity-
swconfig-interfaces-and-routing/mpls-ov.html


QUESTION 3
Which Junos platform supports provider bridging?

A. T Series devices
B. SRX Series devices
C. MX Series devices
D. MAG Series devices

Answer: B

Explanation: https:://www.juniper.net/techpubs/en_US/junos10.0/information-products/pathway-
pages/mx-series/ethernet-switching-mx-series.html


QUESTION 4
In which environment would you run BGP?

A. a company spread across multiple floors of a building
B. a company with a single office
C. a home network
D. the public Internet

Answer: D

Explanation:


QUESTION 5
For a network running single-area OSPF, how would you decrease the size of the link-state
database (LSDB)?

A. Implement RIP as an overlay protocol on all devices.
B. Add more devices to the OSPF network to help with LSDB processing.
C. Reduce the frequency of hello timers throughout the network.
D. Implement OSPF areas.

Answer: D

Explanation:

Click here to view complete Q&A of JN0-342 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Juniper JN0-342 Certification, Juniper JN0-342 Training at certkingdom.com

JN0-102 Junos, Associate (JNCIA-Junos)

JNCIA-Junos Exam Objectives (Exam: JN0-102)

Networking Fundamentals
Identify the concepts and functionality of various fundamental elements of networking
Collision domains and broadcast domains
Function of routers and switches
Optical network fundamentals – SONET/SDH, OTN
Ethernet networks
Layer 2 addressing, including address resolution
IPv4 and IPv6 fundamentals
Layer 3 / IP addressing, including subnet masks
Subnetting and supernetting
Decimal to binary conversion
Longest match routing
Connection-oriented vs. connectionless protocols

Junos OS Fundamentals
Identify the concepts, benefits and functionality of the core elements of the Junos OS
Junos device portfolio – product families, general functionality
Software architecture
Control and forwarding planes
Routing Engine and Packet Forwarding Engine
Protocol daemons
Transit traffic processing
Exception traffic

User Interfaces
Identify the concepts, operation and functionality of the Junos user interfaces
CLI functionality
CLI modes
CLI navigation
CLI Help
Filtering output
Active vs. candidate configuration
Reverting to previous configurations
Modifying, managing, and saving configuration files
Viewing, comparing, and loading configuration files
J-Web – core/common functionality

Junos Configuration Basics
Identify the main elements for configuring Junos devices
Factory-default state
Initial configuration
User accounts
Login classes
User authentication methods
Interface types and properties
Configuration groups
Additional initial configuration elements – NTP, SNMP, syslog, etc.
Configuration archival
Logging and tracing
Rescue configuration
Describe how to configure basic components of a Junos device

Operational Monitoring and Maintenance
Identify methods of monitoring and maintaining Junos devices
Show commands
Monitor commands
Interface statistics and errors
Network tools – ping, traceroute, telnet, SSH, etc.
Real-time performance monitoring (RPM)
Junos OS installation
Software upgrades
Powering on and shutting down Junos devices
Root password recovery
Describe monitoring and maintenance procedures for a Junos device

Routing Fundamentals
Identify basic routing concepts and functionality for Junos devices
Packet forwarding concepts
Routing tables
Routing vs. forwarding tables
Route preference
Routing instances
Static routing
Advantages of / use cases for dynamic routing protocols
Describe how to configure and monitor basic routing elements for a Junos device

Routing Policy and Firewall Filters
Identify the concepts and functionality of routing policy and firewall filters on Junos devices
Default routing policies
Import and export policies
Routing policy flow
Effect of policies on routes and routing tables
Policy structure and terms
Policy match criteria, match types, and actions
Firewall filter concepts
Firewall filter concepts
Filter match criteria and actions
Effect of filters on packets
Unicast reverse-path-forwarding (RPF)
Describe how to configure and monitor routing policies and firewall filters on a Junos device


QUESTION 1
The IP address 10.1.1.1 belongs to which class of IP address space?

A. Class A
B. Class B
C. Class C
D. Class D

Answer: D

Explanation:


QUESTION 2
For the interface ge-1/2/3.4, what does “ge” represent?

A. SONET/SDH
B. Gigabit Ethernet
C. Aggregated Ethernet
D. GRE

Answer: A

Explanation:


QUESTION 3
Which word starts a command to display the operational status of a Junos device?

A. put
B. set
C. show
D. get

Answer: A

Explanation:


QUESTION 4
Which command prompt indicates that you are in operational mode?

A. user@router&
B. user@router#
C. user@router%
D. user@router>

Answer: D

Explanation:


QUESTION 5
What is the decimal equivalent of 00000100?

A. 2
B. 4
C. 9
D. 12

Answer: D

Explanation:

 

Click here to view complete Q&A of JN0-102 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Juniper JN0-102 Certification, Juniper JN0-102 Training at certkingdom.com

JN0-311 Juniper Networks Certified Internet Associate WX (JNCIA-WX)

JNCIA-WX Exam Objectives (Exam: JN0-311)

WX Framework Overview
Technology Overview
Name and define the various patented technologies which allow state-of-the-art compression and acceleration of WAN traffic.
Product Overview
List the WAN Acceleration Platforms and describe their differences.
Define how the WX Framework relates to Routing.

Basic Installation
Pre-installation and Configuration Considerations
List the pre-installation and configuration considerations.
Installation Tasks
Describe the procedure to connect to the Web Console or CLI.
List the steps in Quick Setup.
List common items configured to complete initial installation
Configure application definitions

Basic Configuration and Compression
Configuring Endpoints for Reduction Tunnels
Describe the procedure to verify if the Endpoints are configured properly.
Describe how to verify if the Reduction Tunnels are up and passing data.
Molecular Sequence Reduction (MSR)
Define the patented technology which allows state-of-the-art compression of WAN traffic.
Network Sequence Caching (NSC)
List the differences between MSR and NSC.

Route Learning
Discovering Local Routes
List the ways a WX device can learn routes for optimization.
Configure RIP and OSPF support.
Advertising Reduction Subnets
Define Reduction Subnets.
Configuring Reduction Filters
Describe the use of a reduction filter.

Quality of Service
Describe the components of outbound QoS.
Describe the difference between dedicated and oversubscribed WANs.
Describe the types of QoS settings that require Direct Setup.
List the reasons why you would use Bandwidth Detection.
Describe the difference between WFQ and WSP.

Packet Flow Acceleration
Examine each method of Packet Flow Acceleration (PFA).
Describe the WAN environments and applications that can benefit most from each PFA method.
Configuring Packet Flow Acceleration.

Application Flow Acceleration
Overview of Application Flow Acceleration
Describe the difference between Packet Flow Acceleration and Application Flow Acceleration.
Describe the applications supported by Application Flow Acceleration.
Common Internet File System (CIFS)
List the CIFs commands that the WX platform accelerates.
List the requirements for CIFS acceleration configuration.
Exchange and the Messaging Application Programming Interface (MAPI)
Define the Exchange and Outlook versions the WX accelerates.
HyperText Transfer Protocol (https:)
Define the difference between header and content caching.
Configuring AppFlow
Describe how to configure Application Flow Acceleration.

Monitoring and Reporting
Interpret reporting statistics.
List the WAN reports available on the WX and WXC platforms.
Identify the statistics of a data reduction report.
Identify the statistics of a data acceleration report.
Describe an Executive Summary report.
Identify the statistics of a QoS report.

WX Central Management System (WX CMS)
Describe the functionality of the WX CMS software.

Operation and Maintenance
Describe the security features.
Describe SNMP and DNS support.
Describe how to upgrade WXOS software and maintain configuration files.
Describe the logs and Syslog support.
List the WX network tools.

Troubleshooting
Basic Installation
Describe the error messages which indicate the WX is not cabled properly.
Basic Configuration and Compression
Name the preferred community topologies.
List the Switch-to-Wire functionality.
Route Learning
Verify proper default gateway connectivity.
Application Flow Acceleration
List the reasons why AppFlow may not be working.
Operation and Management
List the ways to export data and generate support files.
Compression
List reasons why Compression may not be working.
Packet Flow Acceleration
List reasons why Packet Flow Acceleration may not be working.


QUESTION 1
Which two configurations are made using the QoS Setup Wizard? (Choose two.)

A. Assign applications to traffic classes.
B. Use ToS/DSCP values for traffic classes.
C. Exclude subnets from QoS management.
D. Select dedicated vs. over-subscribed circuits.

Answer: A,D

Explanation:


QUESTION 2
Which three locations in WebView allow you to confirm that the endpoints are configured properly?
(Choose three.)

A. Monitor > Endpoints
B. Acceleration > Endpoints
C. Device Setup > Endpoints
D. Compression > Endpoints
E. Admin > Maintenance > Display Configuration

Answer: A,D,E

Explanation:


QUESTION 3
When defining an application for AppFlow acceleration, which two must be configured on the WX
device? (Choose two.)

A. Define application type.
B. Enable AppFlow for the application.
C. Enable monitoring for the application.
D. Define source and destination IP addresses.

Answer: A,B

Explanation:


QUESTION 4
What are three key prE.installation/configuration considerations when deploying a WX device?
(Choose three.)

A. cabling
B. community topology
C. requires a license key
D. requires two IP addresses
E. registration server designation

Answer: A,B,E

Explanation:

Click here to view complete Q&A of JN0-311 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Juniper JN0-311 Certification, Juniper JN0-311 Training at certkingdom.com