Juniper JN0-460 Exam (page: 2)
Juniper Mist AI Wired, Specialist (JNCIS-MistAI-Wired)
Updated on: 02-Jan-2026

Viewing Page 2 of 10

Which statement is correct about the VXLAN data plane?

  1. The data plane learns the IP addresses of end-user devices.
  2. The data plane advertises the MAC addresses of end-user devices.
  3. The data plane encapsulates the traffic.
  4. The data plane learns the MAC addresses of end-user devices.

Answer(s): C

Explanation:

VXLAN (Virtual Extensible LAN) uses an overlay encapsulation method to carry Layer-2 frames over an IP underlay. This functionality is part of the data plane, which is responsible for packet forwarding and encapsulation/decapsulation.

"In an EVPN-VXLAN fabric, the control plane (via BGP EVPN) learns and advertises MAC and IP information, while the data plane encapsulates and forwards traffic using VXLAN tunnels between VTEPs."

Option A is incorrect: IP learning happens in the control plane, not the data plane.

Option B is incorrect: MAC advertisement is done in the control plane through EVPN route types.

Option D is incorrect: MAC learning is handled by EVPN control plane, not the VXLAN data plane.

Option C is correct: the VXLAN data plane encapsulates the traffic in UDP tunnels between VTEPs.


Reference:

Juniper Mist AI for Wired ­ EVPN-VXLAN Overview

Juniper Validated Design ­ EVPN-VXLAN Control and Data Plane Separation

Junos OS EVPN-VXLAN Deployment Guide



What are two unique advantages about configuration automation in Wired Assurance? (Choose two.)

  1. 100% open APIs
  2. client SLEs
  3. programmable workflows
  4. switch insights

Answer(s): A,C

Explanation:

Wired Assurance in Mist Cloud provides automated configuration for Juniper EX Series switches. The automation is built on open APIs and supports programmable workflows, which allow seamless integration with external systems and reduce manual configuration errors.

"Wired Assurance leverages 100% open APIs, enabling integration with third-party automation and orchestration tools. Combined with programmable workflows, this provides a consistent and scalable automation framework for switch deployment and management."

Option A (100% open APIs): Correct -- APIs enable automation and external integration.

Option C (programmable workflows): Correct -- workflows automate repetitive tasks and provisioning.

Option B (client SLEs): Incorrect -- this is part of user experience monitoring, not automation.

Option D (switch insights): Incorrect -- this relates to telemetry and visibility, not automation.


Reference:

Juniper Mist AI for Wired ­ Wired Assurance Overview

Juniper Mist AI for Wired ­ Switch Automation and APIs Guide

Juniper Validated Design ­ Mist Wired Automation Best Practices



In Juniper Mist cloud services, service level expectation (SLE) telemetry is collected from every device and stored for up to how long?

  1. 1 month
  2. 2 months
  3. 7 days
  4. 24 hours

Answer(s): A

Explanation:

Juniper Mist AI collects telemetry for Service Level Expectations (SLEs) across wired and wireless devices. This telemetry includes metrics such as time-to-connect, throughput, coverage, and switch performance.
"Service Level Expectation (SLE) data is collected from every device and stored for up to one month in the Mist Cloud. This allows administrators to analyze historical performance trends and troubleshoot issues based on real-time and historical data." Option B (2 months): Incorrect -- data is not retained this long. Option C (7 days): Incorrect -- telemetry retention is longer. Option D (24 hours): Incorrect -- too short for Mist SLE analytics. Option A (1 month): Correct -- Mist Cloud retains SLE telemetry for 30 days (1 month).


Reference:

Juniper Mist AI for Wired ­ Service Level Expectations Overview Juniper Mist AI for Wired ­ Telemetry and Data Retention Guide ===========



Which campus fabric architecture supports Layer 3 gateways at the distribution layer?

  1. campus fabric core/distribution ­ centrally-routed bridging (CRB)
  2. campus fabric IP Clos
  3. campus fabric core/distribution ­ edge-routed bridging (ERB)
  4. EVPN multihoming

Answer(s): C

Explanation:

In Juniper's campus fabric architectures, the location of the Layer 3 gateway (IRB) differentiates between CRB and ERB models:
Centrally-Routed Bridging (CRB): L3 gateways are placed at the core layer. Edge-Routed Bridging (ERB): L3 gateways are placed at the distribution layer, closer to the edge. "In the ERB model, Layer 2 gateways are deployed at the access layer, and Layer 3 gateways are deployed at the distribution layer."
Option A (CRB): Incorrect -- L3 is at the core, not distribution. Option B (IP Clos): Incorrect -- in 3-stage Clos, L3 is pushed to the access layer. Option D (EVPN multihoming): Incorrect -- this is about redundancy, not gateway placement. Option C (ERB): Correct -- L3 gateways sit at the distribution layer in the ERB architecture.


Reference:

Juniper Mist AI for Wired ­ Campus Fabric Architecture Models

Juniper Validated Design ­ Core/Distribution CRB vs ERB Gateways Junos OS EVPN-VXLAN Campus Fabric Deployment Guide



You have deployed your switches and need to provide a unique hostname on each switch.
Which Mist dashboard option allows you to accomplish this task?

  1. Organization switch template
  2. Site switch configuration
  3. Individual switch configuration
  4. Device profiles

Answer(s): C

Explanation:

In Juniper Mist Cloud, there are multiple configuration scopes:
Organization-level templates apply globally.
Site-level configuration applies across all devices in a site. Individual switch configuration is used to define unique, device-specific attributes such as hostname, management IP, or local overrides.
"Templates and site-level configuration ensure consistency across devices, while individual switch configuration is used to assign unique values such as hostnames." Option A: Incorrect -- org templates define common config, not hostnames. Option B: Incorrect -- site configs are shared across all switches in the site. Option D: Incorrect -- device profiles apply settings like port policies or authentication, not hostnames.
Option C: Correct -- individual switch configuration is the correct place to assign hostnames uniquely per device.


Reference:

Juniper Mist AI for Wired ­ Switch Configuration Hierarchy Juniper Mist Documentation ­ Device-Level Configuration in Wired Assurance ===========



Which two statements are correct about the campus fabric core-distribution architecture? (Choose two.)

  1. Only the core and distribution tiers are part of the EVPN-VXLAN topology.
  2. Only the core tier participates in the EVPN-VXLAN topology.
  3. The access tier is included in the EVPN-VXLAN topology.
  4. The access tier does not participate in the EVPN-VXLAN topology.

Answer(s): A,D

Explanation:

In a core-distribution campus fabric model, the EVPN-VXLAN overlay is established only between the core and distribution tiers. The access switches are not part of the EVPN fabric; they connect upstream to distribution but do not run VXLAN tunnels. "In the core-distribution campus fabric, only the core and distribution layers participate in the EVPN- VXLAN topology. The access layer connects to the distribution switches and forwards traffic but does not take part in the EVPN-VXLAN fabric."
Option A: Correct -- EVPN-VXLAN is built between core and distribution tiers. Option B: Incorrect -- both core and distribution participate, not just core. Option C: Incorrect -- access switches are excluded from EVPN-VXLAN participation.

Option D: Correct -- the access layer does not participate in EVPN-VXLAN.


Reference:

Juniper Mist AI for Wired ­ Campus Fabric Core-Distribution Architecture Juniper Validated Design ­ EVPN-VXLAN Campus Deployment Models Junos OS EVPN Campus Fabric Design Guide



What information does Mist use to determine if the port is classified as an uplink? (Choose two.)

  1. if TX and RX are higher than the rest of the ports
  2. if the port has an MTU greater than 1500 configured
  3. if the port is an STP root port
  4. if the port has a description configured

Answer(s): A,C

Explanation:

Juniper Mist automatically classifies ports to simplify visibility and automation within Wired Assurance. The Mist cloud analyzes port telemetry and link behavior to determine port roles, including uplinks.
"Mist uses machine learning and switch telemetry to automatically detect uplinks by analyzing traffic behavior and topology information. Uplink ports typically exhibit higher TX/RX utilization and are identified as spanning-tree root or forwarding ports connecting upstream devices." Option A: Correct -- Mist examines traffic statistics. Ports with significantly higher TX/RX utilization relative to others are likely uplinks.
Option B: Incorrect -- MTU size is not a classification criterion. Option C: Correct -- Mist uses STP information (root or designated port status) to identify uplinks. Option D: Incorrect -- port description fields are for administrative purposes only and are not used by Mist analytics.


Reference:

Juniper Mist AI for Wired ­ Port Role Classification and Telemetry Juniper Mist AI for Wired ­ Automated Uplink Detection and Insights Juniper Wired Assurance Analytics Guide



Which two statements are correct about the EVPN-VXLAN control plane? (Choose two.)

  1. The control plane encapsulates the traffic.
  2. The control plane learns the MAC addresses of end-user devices.
  3. The control plane learns the IP addresses of end-user devices.
  4. The control plane rewrites the destination MAC address of the packet.

Answer(s): B,C

Explanation:

In an EVPN-VXLAN fabric, the control plane operates over BGP EVPN and is responsible for distributing endpoint reachability information (MAC and IP) among VTEPs. The data plane, by contrast, performs encapsulation and forwarding.
"The EVPN control plane uses BGP to exchange MAC and IP address reachability information between VTEPs, enabling efficient forwarding and loop prevention without relying on flood-and- learn behavior."
Option A: Incorrect -- encapsulation occurs in the data plane, not the control plane. Option B: Correct -- the control plane distributes MAC-to-VTEP mappings. Option C: Correct -- the control plane also distributes IP-to-MAC associations (Type 2 and Type 5 EVPN routes).
Option D: Incorrect -- the control plane does not alter packet headers.


Reference:

Juniper Mist AI for Wired ­ EVPN-VXLAN Overview
Juniper Validated Design ­ EVPN Control and Data Plane Operation Junos OS EVPN-VXLAN Implementation Guide



Viewing Page 2 of 10



Share your comments for Juniper JN0-460 exam with other users:

Nani 9/10/2023 12:02:00 PM

its required for me, please make it enable to access. thanks
UNITED STATES


ethiopia 8/2/2023 2:18:00 AM

seems good..
ETHIOPIA


whoAreWeReally 12/19/2023 8:29:00 PM

took the test last week, i did have about 15 - 20 word for word from this site on the test. (only was able to cram 600 of the questions from this site so maybe more were there i didnt review) had 4 labs, bgp, lacp, vrf with tunnels and actually had to skip a lab due to time. lots of automation syntax questions.
EUROPEAN UNION


vs 9/2/2023 12:19:00 PM

no comments
Anonymous


john adenu 11/14/2023 11:02:00 AM

nice questions bring out the best in you.
Anonymous


Osman 11/21/2023 2:27:00 PM

really helpful
Anonymous


Edward 9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you
CANADA


Monti 5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.
UNITED STATES


Anon 10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?
MALAYSIA


PeterPan 10/18/2023 10:22:00 AM

are the question real or fake?
Anonymous


CW 7/11/2023 3:19:00 PM

thank you for providing such assistance.
UNITED STATES


Mn8300 11/9/2023 8:53:00 AM

nice questions
Anonymous


Nico 4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.
ITALY


Chere 9/15/2023 4:21:00 AM

found it good
Anonymous


Thembelani 5/30/2023 2:47:00 AM

excellent material
Anonymous


vinesh phale 9/11/2023 2:51:00 AM

very helpfull
UNITED STATES


Bhagiii 11/4/2023 7:04:00 AM

well explained.
Anonymous


Rahul 8/8/2023 9:40:00 PM

i need the pdf, please.
CANADA


CW 7/11/2023 2:51:00 PM

a good source for exam preparation
UNITED STATES


Anchal 10/23/2023 4:01:00 PM

nice questions
INDIA


J Nunes 9/29/2023 8:19:00 AM

i need ielts general training audio guide questions
BRAZIL


Ananya 9/14/2023 5:16:00 AM

please make this content available
UNITED STATES


Swathi 6/4/2023 2:18:00 PM

content is good
Anonymous


Leo 7/29/2023 8:45:00 AM

latest dumps please
INDIA


Laolu 2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
UNITED STATES


Zaynik 9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
Anonymous


Massam 6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
Anonymous


Anonymous 12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
INDIA


Japles 5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
Anonymous


Faritha 8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures
UNITED STATES


Anonymous 9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i
UNITED STATES


p das 12/7/2023 11:41:00 PM

very good questions
UNITED STATES


Anna 1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?
KOREA REPUBLIC OF


Bhavya 9/13/2023 10:15:00 AM

very usefull
Anonymous