Which data format is used for exchanging data with the Juniper Mist REST API?
YAML
protocol buffers
JSON
XML
The Juniper Mist REST API uses the JSON (JavaScript Object Notation) format for data exchange. The official Juniper Mist REST API overview states: “Juniper Mist uses REST APIs, which use HTTP methods (GET, POST, PUT, and DELETE) to transfer data in JavaScript Object Notation (JSON) format.” All interactions with the API involve sending request payloads in JSON, and receiving responses encoded in JSON as well. Juniper Mist’s automation and integration guides reinforce that the content type for API communications is always "application/json". Sample requests provided in the documentation, such as creation or feedback from POST, PUT, and GET methods, are displayed in JSON structure.
Unlike other formats such as YAML, XML, or protocol buffers, JSON is universally supported and highly favored for RESTful APIs because it is lightweight, human readable, and easily parsed by web and programming frameworks. This ensures consistency and compatibility across diverse integrations and automation workflows using the Mist platform.
Your organization has a Marvis subscription. You have an issue with an access point (AP) that does not power on. You decide to open a support ticket.
In this scenario, what does Marvis do while you are filling in the details on the New Ticket screen?
Marvis creates the support tickets.
Marvis sends an e-mail to support@juniper.net on your behalf.
Marvis provides links to Internet resources about AP power problems.
Marvis provides possible solutions to AP power problems from the Juniper Mist documentation.
When an administrator begins to open asupport ticketwithin theJuniper Mist portal, theMarvis Virtual Network Assistantproactively assists by presenting relevant, AI-driven recommendations and documentation.
According to theJuniper Mist Marvis Virtual Network Assistant Guide, this process is described as:
“While an administrator creates a support case, Marvis automatically searches the Mist knowledge base and presents probable causes and recommended solutions based on the detected issue type.”
If the issue involves anAP that does not power on, Marvis retrieves contextual data such as PoE status, switch port state, and recent telemetry logs, then providesautomated guidance—for example, checking PoE configurations or cable connectivity.
Thus, while the administrator fills in the “New Ticket” details,Marvis provides potential solutions directly from Juniper Mist’s documentation, potentially resolving the issue before a support case is even submitted.
The correct answer isD. Marvis provides possible solutions to AP power problems from the Juniper Mist documentation.
Your manager asks you to configure all your remote Juniper EX Series switches to use Dynamic Port Configuration.
In this scenario, what are two criteria used for matching connected devices and assigning them their correct port and VLAN? (Choose two.)
Serial Number
IP Address
LLDP Chassis ID
MAC Address
Dynamic Port Configuration (DPC)inJuniper Mist Wired Assuranceallows EX Series switches to automatically assign port profiles, VLANs, and policies to connected devices based on their unique identifiers. This automation simplifies switch management and ensures consistent configurations across distributed networks.
According to theJuniper Mist Wired Assurance Configuration and Dynamic Port Management Guide:
“Dynamic Port Configuration matches connected endpoints using identifiers such as LLDP chassis ID and MAC address to assign the appropriate port profile or VLAN automatically.”
LLDP Chassis ID (C):Identifies the connected device by its LLDP advertisement, often representing a switch, phone, or AP.
MAC Address (D):Provides unique device identification, ensuring precise port and VLAN assignment even when LLDP data is unavailable.
OptionsA (Serial Number)andB (IP Address)are not used for port configuration matching in DPC because they are not always available at the time of link establishment.
Therefore, the correct answers areC. LLDP Chassis IDandD. MAC Address.
Which two features are part of Juniper Mist Wired Assurance? (Choose two.)
template-based configuration for switches
template-based configuration for routers
WxLAN policies
port profiles
Juniper Mist Wired Assurance delivers robust automation for campus and remote switches by supporting both template-based configuration for switches and port profiles as core features. According to the official Juniper Mist documentation, "Wired Assurance provides cloud-managed switch configuration through scalable templates. These templates are set at the organization or site level, standardizing VLANs, port settings, security options, and other operational parameters for all managed EX and QFX series switches." Furthermore, port profiles allow administrators to automate port assignment and behavior based on dynamic criteria such as LLDP information or MAC addresses: "Dynamic port profiles are applied automatically when specific criteria are detected, simplifying operational workflows and reducing manual errors."
Features like "template-based configuration for routers" and "WxLAN policies" are not part of Mist Wired Assurance. Router configuration is enabled in Routing Assurance, and WxLAN is a Juniper-specific campus automation solution, not directly related to switch management.
Verification:
This aligns with the selections marked in your image ("template-based configuration for switches" and "port profiles"). It is fully verified by Juniper's official guides for Mist Wired Assurance.
Your existing environment has Cisco wireless access points (APs) that use preshared keys to authenticate wireless users. You are asked to enable Juniper Mist Access Assurance for 802.1X (RADIUS) user authentication on these Cisco APs.
How would you accomplish this task?
Use only third-party access points with Juniper Mist Access Assurance.
Configure a new 802.1X SSID on the Cisco AP that references Juniper Mist Access Assurance as the RADIUS server. Add an authentication rule to permit user access in Access Assurance.
Configure a new 802.1X SSID on the Cisco AP that references your Juniper Mist Edge as the RADIUS server. Add an authentication rule to permit user access in Access Assurance.
Configure a new 802.1X SSID on the Cisco AP and configure a RADSEC tunnel from the AP to Juniper Mist Access Assurance. Add an authentication rule to permit user access in Access Assurance.
To enable Juniper Mist Access Assurance for 802.1X (RADIUS) authentication with Cisco APs, the correct approach is to configure a new 802.1X SSID on the Cisco AP referencing your Juniper Mist Edge as the RADIUS server (option C). According to Juniper Mist’s official documentation and architecture guides: “Mist Access Assurance supports end-client authentication on third-party infrastructure by leveraging the Mist Auth Proxy application running on a Mist Edge platform. Third-party devices, such as Cisco APs, are added as RADIUS clients at Mist Edge. The Mist Edge proxy handles all RADIUS authentication traffic from the APs, wraps these authentication requests into a secure RadSec tunnel, and relays them to the Mist Access Assurance cloud for validation against configured authentication rules.”
This deployment does not require direct RADSEC tunneling from Cisco APs to Mist Access Assurance (since Cisco APs are not natively RADSEC capable) but uses Mist Edge as an intermediary RADIUS server and authentication proxy. "Add an authentication rule in Access Assurance to permit user access," enabling centralized management and policy enforcement in the Mist Cloud.
Which two statements are correct about the switch configuration hierarchy in Juniper Mist? (Choose two.)
The switch configuration cannot be managed at the organization level.
The switch templates exist at the organization level.
The switch templates exist at the site level.
The switch-specific configuration cannot override switch templates.
TheJuniper Mist Wired Assuranceplatform uses ahierarchical configuration modelto manage switch settings efficiently across organizations and sites. This hierarchy provides flexibility by allowing administrators to applyglobal configurationsthrough templates at theorganization level, while also permitting site-specific customizations.
According to theJuniper Mist Wired Assurance Configuration and Template Management Guide, the configuration hierarchy functions as follows:
“Switch templates can be created at both the organization and site levels. Organization-level templates define global configurations, while site-level templates provide location-specific customization that overrides the organization-level settings where applicable.”
This structure enables consistent policy deployment while preserving site autonomy for unique configurations. For example, global VLAN or QoS configurations can be managed at the organization level, and local templates can adjust settings for switch ports or device groups at specific sites.
Switch-specific overrides are allowed within the hierarchy, ensuring flexibility in cases where unique port or feature configurations are required.
Therefore:
Bis correct because switch templates exist at theorganization levelfor global use.
Cis correct because switch templates also exist at thesite levelfor localized adjustments.
What are Audit Logs used for in Juniper Mist?
to view a complete record of logins
to manage subscriptions and orders
to set up your organization
to view error information about all devices in the organization
Audit Logs in Juniper Mist are used to view a complete record of logins. The documentation states: "On the Audit Logs page, you can see who logged in to the Juniper Mist portal, when they logged in, and what they did." Audit Logs also record configuration and administrative actions by users on all sites within the organization, enabling administrators to track activity for compliance, troubleshooting, and security. This comprehensive record assists with accountability and change tracking, but they do not manage subscriptions, organization setup, or error logs for all devices. Filtering options allow for activity analysis over selectable time periods, by users, and by site to provide detailed insights into administrative behavior and user access history.
You want to override radio frequency templates in Juniper Mist.
Which two settings in the UI will accomplish this task? (Choose two.)
AP-specific settings
Device Profiles
Labels
WLAN Templates
InJuniper Mist Wireless Assurance, radio frequency (RF) configurations such as transmit power, channel width, and band selection are typically managed throughRF Templatesat the site or organization level. However, administrators canoverride RF Template settingsfor specific devices or groups of devices when custom configurations are required.
According to theJuniper Mist Wireless Assurance Configuration Guide, RF template overrides can be accomplished using two UI configuration options:
“Administrators can apply overrides to RF settings either per access point using AP-specific settings or across a defined group of APs using labels.”
AP-specific settings (A):Allow administrators to manually modify the radio parameters of a single access point, overriding site-level template values.
Labels (C):Used to group access points logically (e.g., by floor or building) and apply customized configurations or overrides to those APs collectively.
Device Profiles (B)are used for wired switch configurations, andWLAN Templates (D)control SSID-related configurations—not RF parameters.
Therefore, the correct answers areA. AP-specific settingsandC. Labels.
Which data format is transmitted during a Juniper Mist API request?
CSV
XML
YAML
JSON
TheJuniper Mist Cloud APIfollowsRESTful API design principles, enabling programmatic access to all Mist Cloud functions such as device management, configuration, analytics, and monitoring. REST APIs in Mist use a lightweight and standardized data exchange format to facilitate seamless integration with third-party applications and automation frameworks.
According to theJuniper Mist API Developer Guide:
“All Juniper Mist Cloud API requests and responses are transmitted in JavaScript Object Notation (JSON) format. JSON is used because it is lightweight, easy to parse, and compatible with all modern programming environments.”
JSON is the preferred format because it is both human-readable and machine-efficient, allowing for fast serialization and deserialization of data structures.
Other formats such asCSV,XML, andYAMLare not used for API communication within the Mist Cloud architecture.
Therefore, the correct answer isD. JSON.
You want to change the default language for your Juniper Mist portal.
What will accomplish this task?
Select your ranked language choice from the Alerts page.
Input your primary language in the My Accounts page.
Define your language using Organization templates.
Use the Change Language drop-down list of the Juniper Mist portal.
TheJuniper Mist Cloud portalprovides a user-friendly interface that supports multiple languages to enhance accessibility for global users. The language preference determines the display language for menus, dashboards, and configuration pages across the Mist UI.
According to theJuniper Mist Cloud Administration Guide, the portal’s language can be modified as follows:
“Users can change the display language of the Mist portal using the Change Language drop-down list located in the upper-right corner of the interface.”
This option allows users to immediately switch the UI language without affecting other users in the organization or requiring administrative permissions. The change is applied per user profile and is stored for future sessions.
Other listed options are invalid:
A:The Alerts page does not include language settings.
B:The My Account page shows personal info but not display language options.
C:Organization templates are unrelated to UI preferences.
Therefore, the correct answer isD. Use the Change Language drop-down list of the Juniper Mist portal.
You are creating a new site in the UI.
What are three required configuration settings in this scenario? (Choose three.)
Country
Location
RF Template
Active Hours
Site Name
When creating a new site in the Juniper Mist User Interface, the three required configuration settings are Site Name, Country, and Location. According to Juniper Mist's official configuration guides: "At a minimum, enter the name, time zone, and location..." The 'Information' section of site setup requires the Site Name (a descriptive name to identify the site), Country (which sets regulatory and RF domain requirements), and Location (address or geo-coordinates for the site). These form the basis of the site identity in the Mist cloud and are mandatory for dashboard visibility, compliance, and baseline RF configuration. An RF Template, though critical for wireless tuning, is optional and can be assigned post-site creation. Active Hours are not required for the default site setup and are related to scheduling analytics or location-based services, not to the core creation workflow.
Which two statements are correct about Juniper Mist subscriptions? (Choose two.)
Subscriptions are not associated with a specific device serial number.
If a device fails and is removed from the network, you must manually transfer the subscription to the new device before installing.
Subscriptions are associated with a specific device serial number.
If a device fails and is removed from the network, the subscription will automatically apply to the new device when added.
In theJuniper Mist Cloud licensing model, subscriptions represent service entitlements that enable specific features such asWireless Assurance,Wired Assurance,WAN Assurance,Marvis Virtual Network Assistant, andPremium Analytics. These subscriptions are managed at theorganization leveland are not permanently tied to individual hardware units.
According to theJuniper Mist Licensing and Subscription Management Guide, subscriptions are:
“Cloud-based entitlements associated with an organization, not bound to specific device serial numbers. Devices draw from the subscription pool dynamically.”
This design allows flexibility and simplifies device replacement or scaling:
When a new device (for example, an access point or switch) is added to the organization, thesubscription is automatically assignedto it from the available pool.
If a device isremoved or fails, the subscription is automaticallyreleased and reassignedto a replacement unit—no manual transfer is required.
Therefore:
Ais correct because subscriptions are not linked to a single device’s serial number.
Dis correct because subscriptions automatically reapply when replacement devices are onboarded.
OptionsBandCare incorrect because Juniper Mist subscriptions are organization-based, not hardware-bound, and require no manual reassignment after device failure or replacement.
What are three methods for requesting authentication in the Juniper Mist API? (Choose three.)
Enable MFA with Okta Verify.
Use an HTTPS login with a user name and password.
Use OAuth2 linked to an OAuth provider.
Enable basic authentication with a token.
Use RADIUS certificates.
The three valid methods for requesting authentication with the Juniper Mist API are:
Use an HTTPS login with a user name and password: The Mist API accepts HTTPS requests where credentials are provided directly for session/token generation and user administration.
Use OAuth2 linked to an OAuth provider: "Juniper Mist APIs offer authentication via OAuth2 with various OAuth-compatible identity providers, such as Okta, for secure and federated access."
Enable basic authentication with a token: Mist APIs accept programmatic requests using tokens (API tokens or bearer tokens) for automation, scripting, and integration—each token mapping to specific scopes and user permissions.
Enabling MFA with Okta Verify enhances user portal security but is not an API authentication mechanism. RADIUS certificates are used for infrastructure 802.1X authentication, not for API access.
What are two important components monitored under WAN Edge Health SLEs? (Choose two.)
CPU utilization
memory utilization
application response times
ISP reachability
The WAN Edge Health SLE in Juniper Mist monitors critical operational metrics for WAN edge devices. According to Juniper’s documentation: “Juniper Mist analyzes various factors that affect WAN edge health and assigns a score… Classifiers include Memory—triggered when WAN edge memory utilization is above 80 percent and CPU—triggered when control or data plane CPU utilization is above 90 percent.” These components directly impact the device’s ability to process traffic. Monitoring these parameters enables rapid detection of system resource constraints, which are essential for ensuring optimal WAN performance. While ISP reachability is a separate SLE (usually part of WAN Link SLEs), application response times are tracked in Application SLEs.
Under which category would you identify bad cables using Marvis Actions?
Connectivity
security
Layer 1
Clients
Bad cables are identified under the Layer 1 category within Marvis Actions. Juniper Mist’s documentation states: "Use the Actions dashboard to resolve Layer 1 issues. When you click the Layer 1 button on the Action dashboard, all available Layer 1 actions appear. This category currently contains only one action: bad cable." Marvis can detect and alert for bad cables based on frame errors, link statistics, and AP/Switch behavior, all under the Layer 1 category. Connectivity, security, and client issues are handled under their respective action categories, but bad cabling is specifically monitored and detected as a physical (Layer 1) fault.
Which Juniper Mist role has limited access for a specified grace period?
Super Observer
Installer
Observer
Helpdesk
TheInstallerrole in theJuniper Mist Cloudis atemporary, limited-access account typeused for onboarding network devices—typicallyAccess Points (APs)—during initial deployment. It provides restricted visibility and configuration rights necessary for installation tasks but expires automatically after a definedgrace periodto maintain network security and access control.
According to theJuniper Mist Cloud Administration and User Management Guide:
“The Installer role provides temporary access to add, claim, and verify devices at a site. This access expires automatically after the predefined installation grace period.”
This role is ideal for field engineers or contractors performing device installations without granting them long-term administrative privileges. The grace period is typicallyseven days, after which the Installer account loses access to the organization automatically.
Other roles differ as follows:
Super Observer:Read-only access across the entire organization.
Observer:Read-only access limited to assigned sites.
Helpdesk:Focused on monitoring and basic troubleshooting tasks, not installation.
Therefore, the correct answer isB. Installer.
When viewing the LATEST UPDATES on the Marvis Actions page, you see an action labeled AI VALIDATED.
What does this status mean?
The issue was identified and resolved entirely by Marvis.
The issue is unresolved.
The issue is resolved but was not manually marked resolved.
The issue was marked resolved by an administrator.
In theJuniper Mist Marvis Actions dashboard, issues and recommendations are displayed with status labels indicating their progress and resolution method. One of these statuses isAI VALIDATED, which signifies that the issue was automatically detected, diagnosed, and resolved byMarvis AIwithout requiring manual intervention.
According to theJuniper Mist Marvis Virtual Network Assistant Operations Guide:
“AI VALIDATED indicates that Marvis has confirmed and resolved a network issue autonomously using AI-driven automation and telemetry correlation.”
This means Marvis performed the full troubleshooting cycle—identifying the anomaly, validating its cause, and confirming resolution—based on continuous monitoring and real-time network analytics.
Other statuses include:
UNRESOLVED:Issue is ongoing and needs attention.
RESOLVED:Marked manually by an administrator after resolution.
AI VALIDATED:Confirmed and closed automatically by Marvis AI.
Therefore, the correct answer isA. The issue was identified and resolved entirely by Marvis.
How often does Marvis Minis execute automatic validations?
Every 30 minutes
Every hour
Every week
Every day
Marvis Miniscontinuously validates the health of network services by performing synthetic tests at predefined intervals without requiring user intervention. These tests simulate real client interactions — such as authentication, DHCP, DNS, and application reachability — to detect network issues proactively.
According to theJuniper Mist Marvis Minis Technical Overview, the feature performs:
“Automated validations every hour to ensure wireless, wired, and WAN network services are operating as expected.”
Each validation cycle allows the Minis agent (running on Mist Access Points) to verify connectivity and performance parameters across key stages of the client experience. If any issues are detected, they are automatically surfaced in theMarvis Actions dashboardfor further analysis.
While administrators can trigger additional manual tests,automatic validations occur every hourby default across all enabled sites.
Therefore, the correct answer isB. Every hour.
Which two subscriptions are required to use Marvis Minis? (Choose two.)
WiFi Management and Assurance
Marvis for Wireless
vBLE Engagement
Premium Analytics
To use Marvis Minis, both theWiFi Management and AssuranceandMarvis for Wirelesssubscriptions are required. According to the official Juniper documentation, Marvis Minis "does not require a separate subscription. Any organization with an active Marvis for Wireless subscription is automatically entitled for Marvis Minis support." However, the Marvis for Wireless subscription operates on top of the foundational WiFi Management and Assurance subscription, which is necessary to operate APs and the wireless network within the Mist Cloud. As stated: "In addition to your base Assurance subscriptions (Wireless Assurance, WAN Assurance, or Wired Assurance), you also need Marvis subscriptions for each device..." Therefore, both are prerequisites for using Marvis Minis, ensuring full wireless management with AI-powered digital twin validation.
Using Juniper Mist, you want to claim multiple access points (APs) using a Web browser.
Where in the Juniper Mist Portal would you accomplish this task?
Subscriptions
Devices
Inventory
Client Onboarding
In Juniper Mist, allhardware device onboarding and claiming operations—including access points (APs), switches, and gateways—are performed under theInventorysection of the Mist Cloud Portal.
According to the Juniper Mist Cloud documentation, theInventorypage serves as the centralized location for device lifecycle management. It allows administrators to:
Claim new devicesusing their serial numbers or activation codes.
Batch import multiple APsvia manual entry or CSV upload.
Assign claimed devicesto specific sites for configuration and management.
Monitor device claim status, model type, firmware version, and cloud connectivity state.
The documentation specifies:
“To onboard or claim multiple access points in the Mist Cloud, navigate toOrganization → Inventory, then clickClaim Devices. Enter or paste serial numbers of the APs you want to add, and assign them to the appropriate site.”
Other options are incorrect because:
Subscriptionsmanages licensing and service entitlements.
Devicesshows active device status per site but does not handle claiming.
Client Onboardingis used for guest access or authentication workflows, not hardware management.
Therefore, the correct answer isInventory (C).
In the Juniper Mist UI, which two administrative roles are required to view an organization's Audit Logs? (Choose two.)
Network Admin
Super User
Helpdesk
Installer
To view an organization’s Audit Logs in the Juniper Mist UI, the required roles are Network Admin and Super User. According to Juniper Mist documentation: “Network Admin (with All Sites access) and Super User roles grant permission to view and interact with organization-level features, including Audit Logs and Inventory.” The Audit Logs page provides a chronological record of user logins and configuration changes, and access is restricted to authorized users for security and compliance reasons. The "Super User" role has full read/write access for the entire organization—no restrictions—allowing these users to view Audit Logs without limitation. The "Network Admin" role, when granted access to All Sites (not just specific sites), can also view Audit Logs as part of their permitted organization-level operations. Other roles, such as Helpdesk and Installer, have limited or specific access and cannot access Audit Logs. These permissions ensure that only trusted network administrators and super users have the necessary authority for sensitive audit and compliance functions.
Which two Juniper devices are used in Juniper Mist WAN Assurance? (Choose two.)
SRX Series Firewalls
EX Series Switches
Session Smart Routers
QFX Series Switches
Juniper Mist WAN Assuranceis a cloud-based service that extends Mist AI capabilities to the WAN edge, providing visibility, automation, and AI-driven analytics for WAN devices. It focuses on ensuringend-to-end service assurancefor users and applications across distributed networks.
According to theJuniper Mist WAN Assurance and SD-WAN Deployment Guide, the supported devices include:
“Juniper SRX Series Firewalls and Session Smart Routers (SSR) are integrated with Mist WAN Assurance for telemetry collection, service-level monitoring, and AI-driven troubleshooting.”
SRX Series Firewalls (A):Provide secure WAN connectivity and send real-time telemetry (including throughput, latency, and packet loss metrics) to Mist Cloud.
Session Smart Routers (C):Power the AI-driven SD-WAN solution with application-aware routing and session intelligence, fully integrated into Mist Cloud for advanced visibility and analytics.
EXandQFXswitches are used withWired Assurance, not WAN Assurance.
Therefore, the correct answers areA. SRX Series FirewallsandC. Session Smart Routers.
In the context of Juniper Mist, which two statements describe a bad user minute? (Choose two.)
A metric that tracks how many minutes a user is connected to a network.
A way to normalize a user's negative network experience.
The number of minutes a device is down multiplied by the number of users affected.
The number of affected users multiplied by the number of minutes they are affected.
InJuniper Mist AI, the concept of aBad User Minute (BUM)is a core metric used withinService Level Expectations (SLEs)and theAI-driven analytics engineto quantify negative user experience.
According to theJuniper Mist AI Operations and SLE Analytics Guide, a “bad user minute” is defined as:
“A normalized measure that represents one minute of degraded user experience for one user.”
Mist AI calculates this by multiplying the number of affected users by the number of minutes they experience poor performance. This allows administrators to understand the impact of network issues not just in duration, but in terms of total user experience degradation.
For example, if ten users experience poor connectivity for one minute, the system records10 bad user minutes. This normalization helps Juniper Mistprioritize incidents based on impact, rather than duration alone, allowing administrators to focus on issues that affect the greatest number of users.
Therefore:
Bis correct — it’s a way to normalize a user’s negative experience.
Dis correct — it’s calculated asnumber of affected users × number of minutes affected.
Which two statements describe SLEs? (Choose two.)
SLEs use machine learning to provide a proactive approach to understanding the end-user experience.
SLEs use data science to troubleshoot network issues on an ad hoc basis.
The metrics analyzed to meet specific SLE goals are categorized into classifiers.
SLEs display a detailed list of Wi-Fi clients who have connected to the network.
InJuniper Mist AI,Service Level Expectations (SLEs)form the foundation ofWireless AssuranceandWired Assurance. They provide adata-driven, proactive methodto measure and maintain the quality of user experience, going beyond traditional device-centric monitoring.
According to theJuniper Mist AI Operations GuideandWireless Assurance Documentation, SLEs:
“Leverage machine learning and data science to deliver a proactive understanding of end-user experience and identify root causes of performance issues.”
Each SLE (such asTime to Connect,Roaming,Throughput,Coverage, andCapacity) is composed ofclassifiers, which break down performance metrics into measurable, root-cause categories. Examples includeDHCP,DNS,Authentication, andSignal Qualityclassifiers.
This classifier-based structure enables Mist AI to automatically correlate problems and highlight the most probable cause of degradation—eliminating the need for manual troubleshooting or reactive analysis.
OptionsBandDare incorrect because SLEs arenot ad hoc toolsfor manual troubleshooting and donot simply list connected clients. Instead, they provide intelligent, AI-driven insights into user experience across the network.
Therefore, the correct statements are:
A. SLEs use machine learning to provide a proactive approach to understanding the end-user experience.
C. The metrics analyzed to meet specific SLE goals are categorized into classifiers.
Which Juniper device is used in Routing Assurance?
MX Series
EX Series Switches
Session Smart Routers
SRX Series Firewalls
Routing Assuranceis a feature of theJuniper Mist WAN Assurancesolution, providing AI-driven visibility, analytics, and troubleshooting forJuniper Session Smart Routers (SSR)deployed in SD-WAN environments. The system monitors routing performance, link health, and application traffic to ensure reliable WAN connectivity and performance.
According to theJuniper Mist WAN Assurance and Routing Assurance Guide, the feature is described as:
“Routing Assurance provides continuous monitoring of routing operations and path decisions for Juniper Session Smart Routers, offering AI-driven insights into application routing behavior and WAN path health.”
TheSession Smart Router (SSR)platform—powered by128 Technology(acquired by Juniper Networks)—is specifically designed for AI-driven, session-aware routing. It integrates seamlessly with Mist Cloud to:
Track routing changes and path selection decisions.
Correlate application experience with routing behavior.
Identify and remediate path-related issues automatically through Marvis AI.
Other devices serve different functions:
MX Series– Carrier-grade routing, not used in Mist Routing Assurance.
EX Series– Switches used for Wired Assurance.
SRX Series– Firewalls supporting WAN Assurance and security but not Routing Assurance.
Therefore, the correct answer isC. Session Smart Routers.
Exhibit:

Referring to the exhibit, which two statements are correct about this client event? (Choose two.)
A traceroute file is included.
It is a wireless client.
A dynamic packet capture file is included.
It is a wired client.
In theJuniper Mist Cloud, theClient Eventssection within theMonitoringinterface displays detailed event logs for both wired and wireless clients, providing insights into connectivity, authentication, and performance-related activities. Each event entry may include associated diagnostic files such asdynamic packet captures (DPCs),traceroute data, andsyslogsdepending on the event type and device context.
According to theJuniper Mist AI Operations and Client Event Diagnostics Guide, the platform states:
“Wireless client events provide correlation between client connection attempts and associated diagnostic artifacts such as dynamic packet captures. These files are generated automatically during troubleshooting events and are attached to the event log for administrator review.”
From the exhibit, theclient is shown as a wireless device, indicated by theWi-Fi iconand theSSID association informationvisible in the event details. Additionally, the entry confirms that adynamic packet capture (DPC)file was automatically generated for the event, allowing engineers to download and inspect packet-level activity for root-cause analysis.
Therefore:
B (It is a wireless client)is correct — the event pertains to a Wi-Fi-connected device.
C (A dynamic packet capture file is included)is correct — the log includes a downloadable DPC file.
Which Juniper Mist product enables the onboard Bluetooth Low Energy (BLE) antenna array for listen-only mode?
Access Assurance
Wi-Fi Management and Assurance
vBLE Engagement
Asset Visibility
InJuniper Mist’s Location-Based Services, theAsset Visibilityservice utilizes the built-inBluetooth Low Energy (BLE)antenna array within Mist Access Points to track BLE tags and devices inlisten-only mode. This allows the APs to receive BLE signals emitted by assets and compute their real-time location usingangle-of-arrival (AoA)andRSSI-based triangulation.
According to theJuniper Mist Asset Visibility and Location Services Guide:
“When operating in Asset Visibility mode, the vBLE antenna array in Mist Access Points functions in listen-only mode, collecting BLE chirps from asset tags and relaying this data to the Mist Cloud for location determination.”
This configuration differs fromvBLE Engagement, where APs transmit BLE beacons to interact with mobile apps. InAsset Visibility, the BLE array passively listens to track tagged assets (e.g., equipment, IoT devices) across a defined floor map.
Therefore, the correct answer isD. Asset Visibility.
How do Wireless Assurance SLEs help administrators troubleshoot?
They help streamline the onboarding process.
They manage Juniper Mist subscriptions.
They customize the Guest User portal.
They set benchmarks for network performance and user experiences.
In Juniper Mist AI,Wireless Assurance Service Level Expectations (SLEs)are designed to provideAI-driven visibility into user experience and network performance. Each SLE represents a specific aspect of the end-user journey — such asTime to Connect, Throughput, Coverage, Roaming, Capacity, and Application Experience.
According to the Juniper Mist documentation, SLEs “define measurable benchmarks for user experienceand identify where deviations occur.” This allows administrators to quickly determine whether issues stem from client devices, access points, wired uplinks, or WAN connectivity. When an SLE metric falls below its threshold, Mist AI automatically highlights the affected classifier (for example, DHCP, DNS, or Wi-Fi interference) and providesroot-cause correlationthrough AI-driven insights.
This data-driven approach enables administrators totroubleshoot proactivelyby focusing on user-impacting areas instead of raw device statistics. Thus, Wireless Assurance SLEs act asexperience-based benchmarksthat simplify troubleshooting, improve performance visibility, and shorten mean time to repair (MTTR).
Which Juniper Mist dashboard feature uses the ROAMINGOF element?
Conversational Assistant
Marvis Query Language
Marvis Minis
Wireless SLE
TheROAMINGOF elementis part of theMarvis Query Language (MQL), which is the structured query syntax used byMarvis, Juniper’sVirtual Network Assistant (VNA).
According to theJuniper Mist Marvis and MQL Technical Reference, Marvis Query Language provides advanced data query and automation capabilities that go beyond the conversational interface. It allows administrators to directly extract analytical insights, run network diagnostics, and perform queries related touser experience metricsandService Level Expectations (SLEs).
The documentation specifies:
“MQL is the analytical engine of Marvis that uses elements such as ROAMINGOF, CONNECTIVITYOF, and PERFORMANCEOF to query Mist data and retrieve SLE metrics, performance trends, and device events.”
TheROAMINGOFelement specifically relates to theWireless Roaming SLEcategory, enabling Marvis to evaluate client roaming performance across access points, identify failed transitions, and correlate signal quality or capacity-related issues.
While theConversational Assistant (A)uses natural language queries, it translates them internally intoMQLcommands.Marvis Minis (C)runs synthetic tests, andWireless SLE (D)displays performance metrics but does not directly use MQL syntax elements.
Thus, the correct answer isB. Marvis Query Language.
Which two statements are correct about the Juniper Mist vBLE Asset Visibility mode? (Choose two.)
The vBLE antenna is in the receive mode.
The vBLE antenna tracks chirps from BLE tags.
The vBLE antenna communicates with mobile devices running the Juniper Mist location SDK.
The vBLE antenna is in the transmit mode.
Juniper Mist’svirtual Bluetooth Low Energy (vBLE)technology is designed to deliverprecise indoor location servicesusing cloud-managed access points equipped with integrated BLE antenna arrays. The system supports multiple operational modes, includingEngagement Mode(for mobile app interactions) andAsset Visibility Mode(for BLE tag tracking).
According to theJuniper Mist Location Services Documentation, inAsset Visibility Mode, the vBLE antenna functions primarily inreceive modeto detect and process signals emitted fromBLE asset tags. These tags periodically transmit Bluetooth “chirps” that are received by multiple APs. Mist Cloud then usesangle-of-arrival (AoA)andRSSI triangulation algorithmsto determine the exact location of the asset within the facility.
The documentation specifies:
“In Asset Visibility Mode, the vBLE antenna operates in receive mode and listens for BLE tag beacons (chirps). The system triangulates these signals to calculate the real-time location of tracked assets.”
Conversely,Engagement Modeis the configuration in which vBLE operates intransmit modeto interact with mobile devices running the Mist SDK — which corresponds to location-based engagement or proximity notifications.
Thus, the correct answers are:
A. The vBLE antenna is in the receive mode
B. The vBLE antenna tracks chirps from BLE tags