Practice Free JN0-750 Exam Online Questions
The Compliance Officer wants to write a Python script to programmatically audit the RADIUS configuration for all sites in the organization to ensure they are all using the approved `PCI-RADIUS-Config` authenticator.
Which Mist API endpoints would the script need to call to achieve this? (Choose 2.)
- A . `GET /api/v1/sites/{site_id}/accessassurance`
- B . `GET /api/v1/sites/{site_id}/settings`
- C . `GET /api/v1/orgs/{org_id}/sites`
- D . `GET /api/v1/orgs/{org_id}/accessassurance`
- E . `GET /api/v1/orgs/{org_id}/deviceprofiles`
The Compliance Officer wants to write a Python script to programmatically audit the RADIUS configuration for all sites in the organization to ensure they are all using the approved `PCI-RADIUS-Config` authenticator.
Which Mist API endpoints would the script need to call to achieve this? (Choose 2.)
- A . `GET /api/v1/sites/{site_id}/accessassurance`
- B . `GET /api/v1/sites/{site_id}/settings`
- C . `GET /api/v1/orgs/{org_id}/sites`
- D . `GET /api/v1/orgs/{org_id}/accessassurance`
- E . `GET /api/v1/orgs/{org_id}/deviceprofiles`
The company has a fleet of legacy barcode scanners that are essential for warehouse operations but do not support 802.1X. The Wireless Engineer needs to allow these devices to connect to a secure network. The security team has approved their use provided they are authenticated by their MAC address.
How should the engineer configure Mist to support these devices?
- A . Deploy a separate, hidden SSID for the barcode scanners that has no security.
- B . Create a new WLAN with WPA2-Personal (PSK) and provide the PSK to the scanner operators.
- C . In the Access Assurance policy, create a rule for the barcode scanners that uses MAB as the authentication method and points to the same RADIUS server.
- D . Configure the existing "Corporate-WiFi" WLAN to support both EAP-TLS and MAB (MAC Authentication Bypass).
To meet the security requirements for the "Contractor-Net" WLAN, the Security Engineer wants to use a method where each contractor is issued a unique password for the Wi-Fi. This avoids the security risk of a shared password while also avoiding the overhead of creating full 802.1X accounts.
Which Juniper Mist feature is specifically designed for this use case?
- A . Multi Pre-Shared Key (M-PSK)
- B . WPA3-Personal with SAE
- C . Captive Portal with Social Login
- D . MAC Authentication Bypass (MAB)
A Network Administrator is tasked with creating a "closed-loop" automation workflow for Day 2 operations. The goal is that when Marvis identifies a "Bad Cable" for a switch port, a ticket is automatically opened in ServiceNow and the port is administratively disabled.
Which combination of tools is required to build this workflow?
- A . 1. A Mist Webhook to send the alert. -> 2. An intermediary script or platform (like a SOAR) to receive the webhook and process the logic. -> 3. The Mist REST API to disable the port.
- B . 1. A Mist Alert Template that directly disables the port. -> 2. An email notification to ServiceNow.
- C . 1. Terraform to monitor the port status. -> 2. The `mist-cli` to disable the port.
- D . 1. The Mist REST API to detect the bad cable. -> 2. A Python script to call the ServiceNow API.
A corporate user’s laptop successfully authenticates using its certificate (EAP-TLS) and is assigned the "Corporate-Users" role. However, the user is unable to access an internal file server. The Security Engineer needs to determine if a Mist policy is blocking the traffic.
Which policy object should the engineer investigate first to check for firewall rules that apply to this user?
- A . The Switch Template applied to the user’s switch.
- B . The WxLAN Policy associated with the "Corporate-Users" role.
- C . The "Corporate" WLAN configuration.
- D . The Access Assurance Policy for the site.
A NOC operator is setting up a new Webhook. They are presented with a list of event topics to subscribe to.
Which of the following use cases would be best served by subscribing to the `audit_logs` topic?
- A . Creating a real-time alert in a security dashboard whenever a new administrator account is created in the Mist organization.
- B . Receiving a real-time notification when a user fails to authenticate to an 802.1X network.
- C . Getting a notification when a branch office’s WAN link experiences high latency.
- D . Tracking the physical location of a Wi-Fi enabled asset as it moves through a building.
In the "Data Processing" phase, the Python script needs to parse the API’s JSON response and sort the APs to find the ones with the highest `failure_rate` for the "Time to Connect" metric.
Which of the following Python code snippets correctly accesses the failure rate for the first AP in the sample data?
- A . `data["metrics"][0]["time_to_connect"]["failure_rate"]`
- B . `data[0].get("time_to_connect").get("failure_rate")`
- C . `data[0]["metrics"]["time_to_connect"]["failure_rate"]`
- D . `data[0]["failure_rate"]["time_to_connect"]`
When the SOAR platform receives the Webhook notification, its first step is to execute the quarantine action. The playbook needs to tell Mist to apply the "Quarantine" policy to the client.
Which Mist REST API endpoint must the SOAR platform call to enforce this client quarantine?
- A . `POST /api/v1/sites/{site_id}/clients/unauthorize`
- B . `PUT /api/v1/sites/{site_id}/devices/{ap_mac}`
- C . `POST /api/v1/sites/{site_id}/wlans/{wlan_id}/clients`
- D . `DELETE /api/v1/sites/{site_id}/clients/{client_mac}`
The Security Engineer needs to ensure that if a user at a clinic attempts to access an unauthorized service, such as a gaming website, the session is blocked immediately at the branch.
Which SSR feature enforces this policy at the WAN edge?
- A . The integration with Juniper Advanced Threat Prevention (ATP).
- B . The SSR’s deep packet inspection (DPI) engine identifying the application.
- C . The router’s connection to the Mist cloud.
- D . The SSR’s stateful, session-based firewall.
