Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

JN0-252 Exam Dumps - Mist AI- Associate (JNCIA-MistAI)

Question # 4

The MistUl. what are two Marvis Actions tor the AP category? (Choose two.)

A.

High CPU

B.

MTU Mismatch

C.

Coverage Hole

D.

Health Check Failed

Full Access
Question # 5

You have five clients on the network and 20 minutes of statistics tot each client. In this scenario, how many user minutes does this equal?

A.

100

B.

20

C.

80

D.

120

Full Access
Question # 6

According to Juniper Networks, what are two best practices for AP placement (excluding AP12) for optimal accuracy and stability of location-based services? (Choose two.)

A.

Mount the AP above the ceiling, the LED orientation does not matter.

B.

Enable a wireless mesh.

C.

Each AP should have an unobstructed line of sight to at least two other APs.

D.

Mount the AP on the ceiling with the LED facing the floor.

Full Access
Question # 7

Which two configuration levels are WLAN objects created? (Choose two.)

A.

sue level

B.

device level

C.

user level

D.

org level

Full Access
Question # 8

What does The "Exceeded" status mean for a subscription?

A.

The subscription has been cancelled.

B.

The subscription Is nesting its expiration date.

C.

The allowed usage within the subscription has been surpassed.

D.

The subscription exceeds the number of maximum allowable APs.

Full Access
Question # 9

Which users have rights to invite new administratorto a Mist organization?

A.

any user with an organizationaccount

B.

network admin user only

C.

super user only

D.

users with the 'invite Admin" permission

Full Access
Question # 10

Whichtwo Mist location tracking componentsrun in the cloud? (Choose two.)

A.

BLE tag

B.

location engine

C.

location system

D.

location sensor

Full Access
Question # 11

What are two user roles trial you ate allowed to assign to a new account? (Choose two.)

A.

root

B.

installer

C.

guest

D.

network admin

Full Access
Question # 12

Which two use cases are popular in location-basedservices (LBS) deployments? (Choose two.)

A.

micro segmentation

B.

asset tracking

C.

way finding

D.

SSID scheduling

Full Access
Question # 13

What Is the maximum number of Mist Edge devices supported for high availability?

A.

A maximum of two Mist Edge devices ate supported.

B.

A maximum of 16 Mist Edge devices ate supported.

C.

An unlimited number of Mist Edge devices are supported.

D.

A maximum of three Mist Edge devices are supported.

Full Access
Question # 14

Which step must you take when configuring rogue AP detection?

A.

Enable rogue AP detection.

B.

Set the proximity zones.

C.

Disable honeypot detection.

D.

Set the Radio Resource Management (RRM) interval.

Full Access
Question # 15

Which device detects a Layer 1 bad cable action within Marvis Actions?

A.

access point

B.

wireless client

C.

Mist Edge

D.

wired client

Full Access
Question # 16

Which statement is correct about Wi-Fi location-based services (LBS)?

A.

Wi-Fi LBS requites me Wireless Assurance subscription.

B.

Wi-Fi LBS needs the User Engagement subscription.

C.

Wi-Fi LBS does not require a subscription.

D.

WI-FI LBS requites a Wired Assurance subscription.

Full Access
Question # 17

default, how long does an Installer role have access to a site tor Initial configuration before expiration?

A.

7 days

B.

24 hours

C.

unlimited

D.

48 hours

Full Access
Question # 18

Exhibit.

which two statements are correct? (Choose two.)

A.

You will need to log in to Mist every 60 minutes as long as you are viewing this organization.

B.

You will need to tog in to Mist every 60 minutes regardless of which organization you are viewing

C.

To stay logged In. you will need to perform an action in Mist every 10 minutes as long as you are viewing this organization.

D.

To stay logged In. you will need to perform an action in Mist every 10 minutes regardless of which organization you are viewing.

Full Access
Question # 19

What are two requirements for a WebSocket call? (Choose two.)

A.

WebSocket configuration

B.

WebSocket connection URL

C.

authentication token

D.

encryption token

Full Access