Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-412 Exam Dumps - Cloud. Specialist (JNCIS-Cloud)

Question # 4

You are creating an AppFormix dynamic alarm definition with a dynamic threshold.

In this scenario, which three parameters are available? (Choose three.)

A.

baseline analysis algorithm

B.

state

C.

owner

D.

sensitivity

E.

learning period duration

Full Access
Question # 5

Prior to installing Contrail, which list of settings must be verified on all participating servers?

A.

DHCP is enabled, hostname resolution, and that SSH is enabled

B.

time synchronization, hostname resolution, and that FTP is enabled

C.

time synchronization, hostname resolution, and that SSH is enabled

D.

DHCP is enabled, hostname resolution, and that FTP is enabled

Full Access
Question # 6

Which two statements are true about AppFormix? (Choose two.)

A.

The analytics component of AppFormix takes action on notifications and SLA violations.

B.

AppFormix tracks SLAs and generates alerts in the event of an SLA violation.

C.

AppFoxmix analyzes resource usage trends to predict capacity needs.

D.

AppFormix does not require an agent on compute nodes.

Full Access
Question # 7

Which Kubernetes resource defines the traffic allowed to reach the pod?

A.

SecurityGroup

B.

NetworkPolicy

C.

Ingress

D.

IPAM

Full Access
Question # 8

What are two characteristics of containers used in Contrail? (Choose two.)

A.

Each container has the configuration for all applications running in that container.

B.

Each pod can contain only one container.

C.

Each container has the configuration for all applications running in all containers.

D.

Each pod can contain several containers.

Full Access
Question # 9

Which two statements describe the Kubernetes network policy? (Choose two.)

A.

If a policy is not applied to a pod, then the pod accepts traffic from all sources.

B.

A policy can define traffic in only one direction.

C.

A policy can define traffic in both directions.

D.

If a policy is not applied to a pod, then the pod blocks traffic from all sources.

Full Access