Which two statements are correct about the Juniper Mist vBLE Asset Visibility mode? (Choose two.)
The vBLE antenna is in the receive mode.
The vBLE antenna tracks chirps from BLE tags.
The vBLE antenna communicates with mobile devices running the Juniper Mist location SDK.
The vBLE antenna is in the transmit mode.
Juniper Mist’svirtual Bluetooth Low Energy (vBLE)technology is designed to deliverprecise indoor location servicesusing cloud-managed access points equipped with integrated BLE antenna arrays. The system supports multiple operational modes, includingEngagement Mode(for mobile app interactions) andAsset Visibility Mode(for BLE tag tracking).
According to theJuniper Mist Location Services Documentation, inAsset Visibility Mode, the vBLE antenna functions primarily inreceive modeto detect and process signals emitted fromBLE asset tags. These tags periodically transmit Bluetooth “chirps†that are received by multiple APs. Mist Cloud then usesangle-of-arrival (AoA)andRSSI triangulation algorithmsto determine the exact location of the asset within the facility.
The documentation specifies:
“In Asset Visibility Mode, the vBLE antenna operates in receive mode and listens for BLE tag beacons (chirps). The system triangulates these signals to calculate the real-time location of tracked assets.â€
Conversely,Engagement Modeis the configuration in which vBLE operates intransmit modeto interact with mobile devices running the Mist SDK — which corresponds to location-based engagement or proximity notifications.
Thus, the correct answers are:
A. The vBLE antenna is in the receive mode
B. The vBLE antenna tracks chirps from BLE tags
Exhibit:

Referring to the exhibit, which classifier was the largest contributor to 17% of the capacity issues?
Network Issues
Ethernet
Authorization
Wi-Fi Interference
Within theJuniper Mist Wireless Assurance dashboard, theCapacity SLE (Service Level Expectation)provides visibility into how well the network can handle concurrent users and traffic loads. It identifies the contributing factors, orclassifiers, responsible for degraded capacity performance such asWi-Fi interference, network issues, Ethernet problems, or authorization delays.
According to theJuniper Mist AI Operations and SLE Analytics Guide, the platform:
“Uses classifiers to break down SLE metrics and identify which network factors most heavily contribute to sub-threshold performance.â€
In the exhibit, theWi-Fi interferenceclassifier has the longest bar reaching the full17%, clearly showing it as the largest contributor to capacity degradation. Wi-Fi interference occurs when multiple APs or nearby wireless networks overlap on the same channel, resulting in increased contention, collisions, and reduced airtime availability — all of which impact overall capacity.
Therefore, the correct answer isD. Wi-Fi Interference.
Exhibit:

Referring to the exhibit, which sub-classifier contributed the most to capacity issues?
WiFi Interference
Capacity
Network Issues
Excessive Client Load
In theJuniper Mist Wireless Assurance dashboard, eachService Level Expectation (SLE)is broken down intosub-classifiersto identify the specific causes of degraded user experience. For theCapacity SLE, Mist AI analyzes performance indicators related to access point utilization, airtime availability, client density, and radio congestion.
According to theJuniper Mist Wireless Assurance Analytics Guide, sub-classifiers within the Capacity SLE may include:
WiFi Interference– measures co-channel and adjacent-channel interference.
Capacity– monitors total bandwidth and airtime utilization.
Network Issues– highlights backend transport or switching congestion.
Excessive Client Load– indicates when too many clients are associated with a single access point or radio, leading to reduced throughput and contention.
In the exhibit, theExcessive Client Loadbar clearly shows the highest contribution to the Capacity SLE degradation. This means that the majority of capacity issues were caused byan overloaded access point or radio channelhandling more clients than optimal.
Therefore, the correct answer isD. Excessive Client Load.
What are the principal types of machine learning for AI agents?
Supervised, unsupervised, dynamic programming, and Q-learning
Supervised, unsupervised, Markov decision process, and Bellman equation
Supervised, unsupervised, clustering, and association rules
Supervised, unsupervised, reinforcement, and deep learning
In theJuniper Mist AI ecosystem, the intelligence behind Mist’s automation and insight generation is driven bymachine learning (ML)andartificial intelligence (AI)models. These models enable Mist AI to identify trends, predict network issues, and automate remediation through theMarvis Virtual Network Assistant (VNA).
According to theJuniper Mist AI and Machine Learning Overview, Mist AI utilizes several core ML paradigms:
“Mist AI leverages supervised, unsupervised, reinforcement, and deep learning models to interpret telemetry data, recognize behavioral patterns, and make predictive adjustments for network optimization.â€
Supervised Learning– Uses labeled data for training, allowing Mist AI to identify known issues (e.g., DHCP failures or high latency).
Unsupervised Learning– Detects anomalies or patterns in unlabeled datasets (e.g., identifying abnormal client behavior).
Reinforcement Learning– Continuously improves network performance by using feedback from outcomes of previous actions.
Deep Learning– Employs neural network models for complex pattern recognition and predictive analytics.
These combined learning approaches enable Mist AI to evolve autonomously and maintain accuracy through itsAI efficacy loop.
Therefore, the correct answer isD. Supervised, unsupervised, reinforcement, and deep learning.
Which statement accurately describes the capabilities of the Juniper Mist AI platform?
Juniper Mist AI relies solely on manual data collection for network health solutions and root cause analysis, without using AI algorithms.
Juniper Mist AI uses Predictive Analytics and Correlation Engine (PACE) to collect and analyze pre-connection and post-connection user and location states in near real-time.
The Mist Cloud is not involved in the aggregation and storage of data required by the AI/ML solution, limiting its effectiveness.
Marvis requires substantial user interaction for troubleshooting and does not provide proactive solutions.
TheJuniper Mist AI platformis acloud-native, AI-driven network management solutionthat leverages machine learning and data science to provide predictive insights, proactive troubleshooting, and automated optimization acrosswireless, wired, and WANenvironments.
At the core of this intelligence is thePredictive Analytics and Correlation Engine (PACE), which powers Mist AI’s ability to process and analyze massive volumes of telemetry data in near real time.
According to theJuniper Mist AI Cloud Architecture Guide,
“The Predictive Analytics and Correlation Engine (PACE) collects, correlates, and analyzes pre-connection and post-connection user experience data, enabling real-time visibility and proactive detection of network anomalies.â€
This allows Mist AI to perform the following:
Understand client onboarding and connectivity performance through SLE (Service Level Expectation) metrics.
Detect anomalies automatically and identify root causes with Marvis.
Continuously learn and improve via theMist AI efficacy loop.
OptionsA,C, andDare incorrect because:
Mist AI is fully automated and does not rely on manual data collection.
The Mist Cloud is the central data aggregation and analysis engine.
Marvisis proactive and autonomous, not dependent on user-driven troubleshooting.
Therefore, the correct answer isB. Juniper Mist AI uses Predictive Analytics and Correlation Engine (PACE) to collect and analyze pre-connection and post-connection user and location states in near real-time.
When a Juniper Mist managed switch is powered on, which event must be completed prior to the Zero-Touch Provisioning (ZTP) process moving forward?
All user accounts must be configured on the switch.
A DHCP lease must be obtained by the switch.
NETCONF must be configured on the switch.
The switch's clock must be synchronized with an NTP server.
A DHCP lease must be obtained by the switchbefore the ZTP process proceeds. Juniper documentation clarifies: "Ensure that a DHCP server is reachable. In addition to providing an IP address to the switch, your DHCP server must provide the following information: a default gateway, an NTP server, and a DNS server address..." The initial event in the ZTP workflow is the switch receiving a valid IP address via DHCP. Only after obtaining an address can the switch connect to the Mist cloud and proceed with zero-touch provisioning. Other requirements, such as user account, NETCONF, or NTP sync, occur later or are handled automatically via cloud policy after onboarding.
Which type of machine learning does Radio Resource Management (RRM) use?
Unsupervised learning
Cognitive learning
Reinforcement learning
Supervised learning
TheAI-driven Radio Resource Management (RRM)system inJuniper Mist Wireless Assuranceemploysreinforcement learningto continuously optimize wireless radio parameters such as channel selection, transmit power, and channel width.
According to theJuniper Mist Wireless Assurance and AI-Driven RRM Guide:
“The RRM system leverages reinforcement learning techniques to dynamically adjust radio configurations based on environmental conditions, user density, and interference patterns.â€
Reinforcement learning enables the Mist AI system to make decisions by continuously evaluating the outcome of past configurations and improving future adjustments. This ensures that Mist RRM can autonomously optimize RF conditions for coverage and capacity without manual intervention.
Therefore, the correct answer isC. Reinforcement learning.
Which machine learning method uses unlabeled data sets?
Reinforcement learning
Cognitive learning
Supervised learning
Unsupervised learning
InJuniper Mist AI, variousmachine learning (ML)techniques are applied across the platform to analyze network telemetry and improve performance insights. Among these,unsupervised learningplays a critical role in identifying patterns, trends, and anomalies in unlabeled datasets—data that has not been pre-classified or annotated.
According to theJuniper Mist AI and Machine Learning Overview:
“Unsupervised learning enables Mist AI to automatically detect abnormal patterns or clusters in large volumes of unlabeled network data, allowing the system to identify anomalies and optimize network behavior without human labeling.â€
This method allows Mist AI to autonomously recognize deviations in user experience, traffic behavior, or radio performance without prior definitions, helping to enhance predictive analytics and anomaly detection.
By contrast:
Supervised learningrequires labeled training data.
Reinforcement learninglearns through trial-and-error feedback loops.
Cognitive learningis not a formal ML category—it refers to human-inspired reasoning.
Therefore, the correct answer isD. Unsupervised learning.
What are two important components monitored under WAN Edge Health SLEs? (Choose two.)
CPU utilization
memory utilization
application response times
ISP reachability
The WAN Edge Health SLE in Juniper Mist monitors critical operational metrics for WAN edge devices. According to Juniper’s documentation: “Juniper Mist analyzes various factors that affect WAN edge health and assigns a score… Classifiers include Memory—triggered when WAN edge memory utilization is above 80 percent and CPU—triggered when control or data plane CPU utilization is above 90 percent.†These components directly impact the device’s ability to process traffic. Monitoring these parameters enables rapid detection of system resource constraints, which are essential for ensuring optimal WAN performance. While ISP reachability is a separate SLE (usually part of WAN Link SLEs), application response times are tracked in Application SLEs.
Exhibit:

Referring to the exhibit, what does the AI Validated notification for the WAN Edge tell the user?
Marvis has verified that the issue is resolved and has classified the issue as AI-validated.
Marvis has confirmed that there is an issue at saltlakecity-branch1.
Marvis Actions has encountered an error that requires restarting.
Marvis Actions has automatically fixed the WAN Edge issue at saltlakecity-branch1.
The AI Validated notification for the WAN Edge signifies that Marvis has verified the underlying issue as resolved and has classified the incident as AI-validated. According to the Juniper Mist documentation, when Marvis completes its troubleshooting workflow and determines that a previously surfaced issue is cleared — either by automated remediation or through confirmation of operational health — Marvis marks the issue as “AI Validated.†This indicates both the end of the incident lifecycle and the confidence level provided by Mist’s AI that the environment is healthy and functioning as expected. The notification does not mean an error remains, nor does it confirm merely the presence of an issue, nor that Marvis performed only an automatic fix (which may also be the case, but the “AI Validated†label is for resolved/confirmed resolution status). This is most often seen as a final state within the Marvis Actions interface on the WAN Edge.
Where do reminders about subscription expiration appear in the Juniper Mist portal?
In a banner message at the top of the Juniper Mist portal
In the dashboard alerts
In Marvis Actions
In the device's insights section
Juniper Mist Cloud provides visual and automated notifications to alert administrators aboutsubscription status and expirationfor services such asWireless Assurance, Wired Assurance, WAN Assurance, Premium Analytics, and Marvis AI.
According to theJuniper Mist Cloud Administration and Licensing Guide, the system:
“Displays subscription and license expiration warnings in a banner across the top of the Mist portal interface when licenses are within their renewal window.â€
This banner typically appears in yellow or red, depending on urgency, and includes direct links to theSubscriptionspage for renewal actions.
While subscription status information can also be viewed manually underOrganization → Subscriptions, thereal-time reminders and notificationsappear asbanner messages at the top of the Mist Portal.
OptionsB,C, andDare incorrect because:
Dashboard alerts focus on network events, not licensing.
Marvis Actions highlights operational or performance issues.
Device insights report performance metrics, not subscription data.
Therefore, the correct answer isA. In a banner message at the top of the Juniper Mist portal.
Mist AI collects and integrates data from multiple sources, including the data science and customer success teams and the domain experts. This process improves ML/AI accuracy. What is this process called?
Anomaly detection
Mist AI efficacy loop
Bayesian inference
Marvis Actions
TheMist AI Efficacy Loopis a key concept within theJuniper Mist AI architecturethat ensures continuous improvement of itsmachine learning (ML)andartificial intelligence (AI)models. This process combines feedback and data collected from multiple sources — including real-world network telemetry, customer success feedback, domain experts, and the Mist data science team — to refine the AI algorithms and enhance prediction accuracy.
According to theJuniper Mist AI Operations and Architecture Guide, the process is described as follows:
“The Mist AI efficacy loop is a closed-loop feedback system that continuously collects data from the field, correlates it with expert knowledge and support insights, and uses it to retrain and improve AI models for greater accuracy and reliability.â€
This iterative learning cycle allows Mist AI to:
Improve anomaly detection precision.
Reduce false positives in network issue detection.
Enhance Marvis’s ability to accurately identify root causes and recommend corrective actions.
Theefficacy loopis what differentiates Mist AI from static analytics platforms, as it creates aself-learning systemthat evolves with every deployment and customer interaction.
Therefore, the correct answer isB. Mist AI efficacy loop.
What are two solutions that Juniper Mist Location Services provide? (Choose two.)
asset location
geofencing
wayfinding
GPS location
Juniper Mist Location Services provide asset location and wayfinding. According to official Juniper documentation: "Juniper Mist provides location accuracy for wayfinding, asset visibility, and user engagement," leveraging cloud-native vBLE and Wi-Fi technologies.
Asset location enables organizations to locate high-value resources, personnel, or IoT devices in real time with rich analytics, making it easy to find assets and people using the Mist dashboard and APIs.
Wayfinding gives users turn-by-turn indoor navigation and mapping via mobile SDKs and the Mist cloud.While geofencing can be achieved as part of location-based engagement features, it is not listed as a primary Mist Location Service solution. GPS location is not directly supported; Mist Location Services operate indoors using Wi-Fi and BLE signals, not satellite GPS.
Under which category would you identify bad cables using Marvis Actions?
Connectivity
security
Layer 1
Clients
Bad cables are identified under the Layer 1 category within Marvis Actions. Juniper Mist’s documentation states: "Use the Actions dashboard to resolve Layer 1 issues. When you click the Layer 1 button on the Action dashboard, all available Layer 1 actions appear. This category currently contains only one action: bad cable." Marvis can detect and alert for bad cables based on frame errors, link statistics, and AP/Switch behavior, all under the Layer 1 category. Connectivity, security, and client issues are handled under their respective action categories, but bad cabling is specifically monitored and detected as a physical (Layer 1) fault.
When reviewing your site's SLEs, you notice a significantly high percentage of Asymmetry Uplink errors.
What do these errors indicate?
excessive non-Wi-Fi interference
a coverage hole
excessive client load
slow 802.11r roams
A high percentage of Asymmetry Uplink errors indicates coverage holes caused by asymmetric uplink strength between the AP and client devices. According to Juniper Mist's official documentation: "Asymmetry Uplink—Clients received a weak signal due to asymmetric uplink strength between the AP and the client device. (Uplink traffic is the traffic going from the client to the AP, and then to the Internet.) Asymmetry can occur for various reasons, such as clients being too far from the AP." This generally means that clients are physically located at a distance or behind obstacles (such as walls), causing the AP to detect weak signals from those clients. Coverage holes arise when APs are placed such that some areas have insufficient RF coverage, and the low-powered client devices cannot maintain reliable communication with the AP—even though the AP, with its higher transmit power, might hear the client, the client cannot send strong enough signals back. The SLE classifier is designed to highlight such areas for remediation, prompting network admins to review and enhance AP placement or signal thresholds.
Which two wired elements would be configured using an organization-level template? (Choose two.)
VLAN
host name
role
DNS settings
Two wired elements configured using an organization-level template in Juniper Mist are VLAN and DNS settings. Organization-level templates are designed to standardize and propagate common settings across all switches within an organization. As per official guides: "These templates can include VLANs and well-known services such as DNS (Domain Name System) that can be used across all devices within a site." VLAN and DNS settings are defined once at the organization (or switch group) template and automatically inherited by all devices, ensuring consistency. Host name and role are set at an individual switch level, not globally via templates.
Which statement is correct about the relationship between Juniper Mist organizations and sites?
A Juniper Mist superuser login grants access to all organizations.
One Juniper Mist organization can contain multiple sites.
You must have one Juniper Mist superuser login for each site.
One Juniper Mist site can contain multiple organizations.
According to the official Juniper Mist documentation on the configuration hierarchy, the platform uses a three-tier model: Organization → Site → Device. At the organization level, you manage administrator accounts, subscriptions, and organization-wide settings. Then:
“An organization can include one or more sites. A site can represent a physical location or a logical subdivision of your enterprise or campus.â€
Also, in the simpler case explanation:
“Each customer is created as a separate organization. Within that organization multiple sites can be created.â€
Mist
These statements make clear that the correct relationship is: one organization may have multiple sites under it. The inverse — that a site might contain multiple organizations — is not supported in the documented hierarchy. Therefore option B is correct.
You are asked to display your network devices using the Juniper Mist GUI as a single solution. Your network is made up of a wireless infrastructure of only Juniper APs, and the wired infrastructure has a mix of Juniper and non-Juniper switches. Your solution must ensure that all devices are displayed in the Juniper Mist GUI.
Given this scenario, how would you accomplish this task?
Use Wired Assurance with the Monitoring option.
Use Juniper Mist Marvis Actions.
Use Juniper Mist Asset Visibility.
Use Wi-Fi Management and Assurance with LLDP enabled on all switches.
The appropriate solution is Juniper Mist Asset Visibility (option C). Asset Visibility is a cloud service that leverages Juniper Mist Access Points and virtual Bluetooth Low Energy (vBLE) technology to track, locate, and display all network devices—including both Juniper and non-Juniper hardware—within the Mist GUI. According to the official Juniper documentation: “Juniper Mist Asset Visibility unites Wi-Fi connectivity, indoor location services for asset tracking, and IoT visibility in a single cloud platform. By combining vBLE with the Mist Cloud, organizations can use the same infrastructure—even when wired switches are from different vendors—for locating, tracking, and analyzing their most valuable assets and network devices.â€
This capability is independent of switch manufacturer and provides comprehensive visualization of wireless APs and connected wired devices, ensuring a true single-pane-of-glass management experience. Wired Assurance, Marvis Actions, and LLDP-enabled Wi-Fi Management may provide visibility and proactive troubleshooting, but only Asset Visibility guarantees display and tracking of all assets—Juniper and non-Juniper—in the Mist GUI.
Which Juniper Mist role has limited access for a specified grace period?
Super Observer
Installer
Observer
Helpdesk
TheInstallerrole in theJuniper Mist Cloudis atemporary, limited-access account typeused for onboarding network devices—typicallyAccess Points (APs)—during initial deployment. It provides restricted visibility and configuration rights necessary for installation tasks but expires automatically after a definedgrace periodto maintain network security and access control.
According to theJuniper Mist Cloud Administration and User Management Guide:
“The Installer role provides temporary access to add, claim, and verify devices at a site. This access expires automatically after the predefined installation grace period.â€
This role is ideal for field engineers or contractors performing device installations without granting them long-term administrative privileges. The grace period is typicallyseven days, after which the Installer account loses access to the organization automatically.
Other roles differ as follows:
Super Observer:Read-only access across the entire organization.
Observer:Read-only access limited to assigned sites.
Helpdesk:Focused on monitoring and basic troubleshooting tasks, not installation.
Therefore, the correct answer isB. Installer.
What are two ways that Marvis Minis validates network configurations? (Choose two.)
Marvis Minis uses unsupervised machine learning.
Marvis Minis requires additional hardware for validation.
Marvis Minis validates configurations automatically.
Marvis Minis uses supervised machine learning.
Marvis Minis validates network configurations automatically and uses supervised machine learning. As stated in the Juniper Mist AI documentation, “Marvis Minis runs validations automatically at regular intervals and can be triggered manually by administrators. Minis use network digital twin technology and supervised machine learning to simulate and validate real-world user connectivity events.†The system automatically creates patterns, triggers tests, and correlates real user and simulated network behaviors with the learned models. The validation covers critical network services—such as DHCP, DNS, ARP, and application reachability—and does so across various scopes (site, AP, VLAN, and switch). There is no requirement for additional hardware, as the digital twin reuses existing network infrastructure and existing APs.
Which statement correctly describes Juniper Mist organization IDs?
They are created manually.
They can be edited.
They are in CSV format.
They are read-only.
In theJuniper Mist Cloud platform, each organization is automatically assigned a uniqueOrganization IDupon creation. This ID serves as apermanent, system-generated identifierused for API authentication, integration, and cross-service communication.
According to theJuniper Mist Cloud Administration and API Integration Guide:
“Organization IDs are automatically generated by the Mist Cloud at the time of organization creation and are read-only system values that cannot be edited or modified by administrators.â€
This ensures that every organization is uniquely identifiable across Mist’s distributed cloud infrastructure. The Organization ID remains consistent even if the organization name or configuration changes.
Therefore, the correct answer isD. They are read-only.
Which two features are part of Juniper Mist Wired Assurance? (Choose two.)
template-based configuration for switches
template-based configuration for routers
WxLAN policies
port profiles
Juniper Mist Wired Assurance delivers robust automation for campus and remote switches by supporting both template-based configuration for switches and port profiles as core features. According to the official Juniper Mist documentation, "Wired Assurance provides cloud-managed switch configuration through scalable templates. These templates are set at the organization or site level, standardizing VLANs, port settings, security options, and other operational parameters for all managed EX and QFX series switches." Furthermore, port profiles allow administrators to automate port assignment and behavior based on dynamic criteria such as LLDP information or MAC addresses: "Dynamic port profiles are applied automatically when specific criteria are detected, simplifying operational workflows and reducing manual errors."
Features like "template-based configuration for routers" and "WxLAN policies" are not part of Mist Wired Assurance. Router configuration is enabled in Routing Assurance, and WxLAN is a Juniper-specific campus automation solution, not directly related to switch management.
Verification:
This aligns with the selections marked in your image ("template-based configuration for switches" and "port profiles"). It is fully verified by Juniper's official guides for Mist Wired Assurance.
Which statement is correct about the Super User account role?
The Super User role has limited read/write capabilities.
The Super User role is restricted to the specific sites that are defined when creating the user account.
You must use the Super User role to claim an organization's new AP.
You must use the Super User role to add administrators to an organization.
In theJuniper Mist Cloud platform, user roles define the scope of permissions that determine what administrative functions an individual can perform within an organization. TheSuper Userrole represents thehighest level of administrative authoritywithin a Juniper Mist organization and carries full control over both organization-wide and site-specific configurations.
According to theJuniper Mist Cloud Administration and User Management documentation, the Super User role is described as:
“The Super User role provides full read and write access across the entire organization. Only Super Users can manage organization-level settings, add or remove other administrators, and assign privileges to users.â€
This means that only a Super User canadd new administrators, managesubscription entitlements, configureorganization-level policies, and performfull lifecycle device management. Unlike site administrators, Super Users are not restricted to specific locations—they have unrestricted visibility and control across all sites within the organization.
Therefore, the correct answer isD, since the Super User role is explicitly required toadd administratorsto an organization and perform top-level management operations.
You are asked to configure a site in Juniper Mist.
Which statement describes completing this step?
You must first configure the country, time zone, and location at the organization level.
You must configure the site within your organization.
You must claim your site by scanning the access point's QR code.
You must define your organization within the site.
You must configure the site within your organization—this is the correct process according to Juniper Mist’s official configuration guides. When setting up a deployment, first an organization is created in the Mist cloud. Within this organization, sites are added for each physical location. The Mist documentation says: "You can create Sites in the Juniper Mist portal from the Organization > Site Configuration menu. Add or update sites as needed." The configuration requires the site name, country, and location to be set at the site level—not the organization level. Claiming APs via QR codes and organization definition are separate steps in device onboarding and initial setup.
Which Juniper device is used in Routing Assurance?
MX Series
EX Series Switches
Session Smart Routers
SRX Series Firewalls
Routing Assuranceis a feature of theJuniper Mist WAN Assurancesolution, providing AI-driven visibility, analytics, and troubleshooting forJuniper Session Smart Routers (SSR)deployed in SD-WAN environments. The system monitors routing performance, link health, and application traffic to ensure reliable WAN connectivity and performance.
According to theJuniper Mist WAN Assurance and Routing Assurance Guide, the feature is described as:
“Routing Assurance provides continuous monitoring of routing operations and path decisions for Juniper Session Smart Routers, offering AI-driven insights into application routing behavior and WAN path health.â€
TheSession Smart Router (SSR)platform—powered by128 Technology(acquired by Juniper Networks)—is specifically designed for AI-driven, session-aware routing. It integrates seamlessly with Mist Cloud to:
Track routing changes and path selection decisions.
Correlate application experience with routing behavior.
Identify and remediate path-related issues automatically through Marvis AI.
Other devices serve different functions:
MX Series– Carrier-grade routing, not used in Mist Routing Assurance.
EX Series– Switches used for Wired Assurance.
SRX Series– Firewalls supporting WAN Assurance and security but not Routing Assurance.
Therefore, the correct answer isC. Session Smart Routers.
You are asked to create a real-time visualization dashboard which displays clients on a map.
Which two Juniper Mist functions would you use in this scenario? (Choose two.)
Webhooks
RESTful API
WebSocket
Live View
When developing areal-time visualization dashboardthat displays client locations on a map, Juniper Mist offers specific APIs and data streaming methods to support dynamic updates.
According to the Juniper Mist Developer Documentation, theWebSocketinterface enables continuous,real-time streaming of client location and telemetry datadirectly from the Mist Cloud. This mechanism is ideal for live dashboards, as it eliminates the need for repeated REST API polling. WebSocket connections provide instant updates whenever a device moves, connects, or disconnects, ensuring the displayed map remains accurate in real time.
TheLive Viewfeature complements this functionality within the Mist Cloud and third-party integrations. It allows administrators and developers toview live location movements of Wi-Fi clients, BLE beacons, and IoT deviceswithin a site’s floor plan. It uses telemetry directly from access points, offering second-by-second updates.
In contrast,RESTful APIsandWebhooksare designed for event-based automation and configuration management rather than live visualization. REST APIs are best for historical or static data retrieval, while Webhooks are used for triggering external actions based on events.
Therefore, the correct functions for real-time map visualization are:
WebSocket (C)— for continuous live data streaming
Live View (D)— for direct map-based visualization of client activity
Your organization currently uses Access Assurance for 802.1X authentication of wireless users using user certificates. All users are currently placed in the same VLAN after authentication.
There are multiple VLANs at your sites.
In this scenario, how would you configure Access Assurance to make the network more secure?
Configure MAC Authentication Bypass (MAB) and assign WxLAN roles based on groups of MAC addresses.
Configure user authentication using EAP-TTLS and assign WxLAN roles based on AD user group.
Configure host (machine) authentication using EAP-TLS and assign WxLAN roles based on AD user group.
Configure user authentication using EAP-TLS and assign WxLAN roles based on AD user group.
Juniper Mist Access Assuranceprovidescloud-based network access control (NAC)by integratingRADIUS,identity-based policy enforcement, andWxLAN role-based segmentation. It allows administrators to assign users and devices to specific VLANs or network segments dynamically based on authentication attributes, thereby improving bothsecurityandpolicy granularity.
According to theJuniper Mist Access Assurance Configuration Guide, to enhance network security in a multi-VLAN environment, you should:
“Use EAP-TLS (certificate-based authentication) for secure user identification, and dynamically assign WxLAN roles or VLANs based on Active Directory (AD) group membership.â€
Here’s whyDis correct:
EAP-TLSensuresmutual authenticationbetween client and RADIUS server using digital certificates — preventing credential theft or spoofing.
Integrating withActive Directoryallowsrole-based access control (RBAC), enabling dynamic VLAN or WxLAN assignment. This ensures users from different groups (e.g., staff, contractors, guests) are automatically segmented into appropriate network zones.
Option breakdown:
A (MAB): Used for non-802.1X devices (e.g., printers), less secure for user authentication.
B (EAP-TTLS): Username/password-based and less secure than certificate-based EAP-TLS.
C (Host authentication): Verifies devices only, not user identity—insufficient for user-level control.
Therefore, the most secure and scalable configuration is:
✅D. Configure user authentication using EAP-TLS and assign WxLAN roles based on AD user group.
TESTED 24 Jan 2026