A customer wants to provide advanced Layer 4 through Layer 7 security services for a VMware NSX microsegementation deployment.
Which platform would you recommend using in this scenario?
- A . ACX Series
- B . vMX Series
- C . vSRX Series
- D . QFX Series
Which statement is true about the OpenConfig data model?
- A . It supports YANG
- B . It provides UDP-based transport
- C . It is embedded in all devices that run the Junos OS
- D . It uses MySQL as the default database structure
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?
- A . service orchestration
- B . infrastructure orchestration
- C . physic a telco cloud infrastructure
- D . virtual network functions
According to the juniper network, what is the recommended external routing protocol for the underlay network?
- A . IS-IS
- B . EGP
- C . OSPF
- D . BGP
What are two characteristics of Policy Enforcer? (Choose two)
- A . Policy Enforcer has its own standalone GUI
- B . Policy Enforcer consolidated threat information from multiple sources
- C . Policy Enforcer provides telemetry data for a collector device
- D . Policy Enforcer is integrated with Security Director
Which statement is true about Junos Space security director?
- A . Security director is a standalone management platform
- B . Security director is a centralized security policy manager
- C . Security director is an SDN controller
- D . Security director is a network orchestrator
Which two statements are correct about the NFV framework? (Choose two)
- A . The NFV framework is defined by ANSI
- B . The NFV framework is defined by ETSI
- C . The NFV framework enables horizontally scalable deployments of services
- D . A spine and leaf implementation is an example of the NFV framework
AppFormix alarm notification are sent to an HTTP server using which format?
- A . plain text
- B . XML
- C . CSV
- D . JSON
Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)
- A . MC-LAG
- B . BGPC. LACP
- C . TRILL
Which CSO component enables ISPs to set up and manage the virtual network and customers?
- A . Service and Infrastructure Monitor
- B . Designer Tools
- C . Administration Portal
- D . Customer Portal
From where does AppFormix gather performance metrics in a network?
- A . from RPM probes sent across the network
- B . from statistics NFVs instantiated in the data path
- C . from an agent on the host or system
- D . from a REST API connection
A company requests increased bandwidth during two specific periods each year.
Which solution will accomplish the desired result?
- A . NorthStar planner
- B . NorthStar bandwidth calendaring
- C . NorthStar maintenance Mode
- D . Centralized Path computation
Which statement describes AppFormix?
- A . AppFormix is a high-performance virtual device that secures virtualized and cloud environments
- B . AppFormix is the SDN automation platform for OpenStack Iaas
- C . AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimization
- D . AppFormix is virtualized full-featured, carrier-grade ideal for NFV environments
What are two roles of sandboxing in Sky ATP? (choose two)
- A . To test the operation of security rules
- B . To analyze the behavior of potential security threats
- C . To validate the operation of third-party components
- D . To store infected files for further analysis
What provisions new switches or routers in your network automatically, with no manual intervention?
- A . PCEP
- B . ZTP
- C . BGP
- D . RSVP
What are two characteristics of cloud computing? (Choose two.)
- A . Services are provisioned using automation.
- B . Services are provisioned by the customer
Which cloud architecture provides developers a framework on which to develop and customize applications?
- A . DBaaS
- B . PaaS
- C . IaaS
- D . FWaaS
What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)
- A . SNMP
- B . OSPF-TE
- C . NETCONF
- D . BGP-LS
What are two Microservices provided by contrail services orchestration? (Choose two)
- A . REST API server
- B . Fabric Manager
- C . VIM director
- D . Security director
Which mechanism allows tenants to interconnect across an overlay network?
- A . tunnels
- B . subnets
- C . EBGP connections
- D . P2P OSPF adjacencies
Your company has three connections consisting of MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links.
Which product will facilitate this requirement?
- A . Contrail SD-WAN
- B . Contrail Cloud
- C . Contrail networking
- D . Contrail SD-LAN
Which statement is correct about alarms in AppFormix?
- A . Static alarm are compared against fixed thresholds
- B . Alarm thresholds cannot be changed by the user
- C . Alarm actions cannot be change by the user
- D . Static alarms are compared against historical data
What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (choose two)
- A . Performance
- B . Basic
- C . Lite
- D . Enhanced
Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution?
- A . Administration Portal
- B . AppFormix
- C . Designer Tools
- D . Customer Portal
- E . Service and Infrastructure Monitor
Which two statements describe cloud CPE? (Choose two.)
- A . Cloud CPE require heavy investment in vendor-specific hardware
- B . Cloud CPE encourages administrators to use all-in-one appliances
- C . Cloud CPE allows multivendor, open support of software-based functions
- D . Cloud CPE eliminates the need for investing in expensive hardware
What is used to provide secure access to a vSRX in a public cloud?
- A . authorized key pairs
- B . SSH key pairs
- C . private key pairs
- D . public key pairs
Which statement is true regarding an OpenFlow controller-based software defined network?
- A . The forwarding plane of each device in the network is programmed by the controller
- B . The control plane of each device in the network is instantiated by the controller
- C . The SDN controller pushes configuration files to each device in the network using RESTful APIs
- D . The forwarding plane of each device in the network is managed by the device
Which statement about contrail is true?
- A . The contrail controller places a vRouter each virtual host in the network
- B . The contrail virtual router segments virtual machines on physical hosts into virtual touting and forwarding instances
- C . The contrail virtual router segments virtual machines on physical hosts into different security zones
- D . The contrail virtual router establishes IPsec tunnel between other contrail virtual routers on the network
Which statement is true regarding Layer 3 underlay fabric networks?
- A . Layer 3 underlay fabric networks can only be used across public networks
- B . Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
- C . Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
- D . Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks
What operates below the virtualization layer in an NFV system?
- A . The NFV management and orchestration components
- B . the virtualized network functions (VNFs)
- C . the compute, storage, and network hardware
- D . the OSS and BSS management systems
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
- A . JTI provides real-time telemetry.
- B . JTI does not need a collector to store data
- C . JTI requires no configuration
- D . JTI can stream in multiple data models
What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)
- A . A vMX provides more routing features.
- B . A vMX accelerates adding new services
- C . A vMX has a lower barrier of entry
- D . A vMX increases analytic capabilities
B,C
Explanation:
https://www.juniper.net/documentation/en_US/vmx/topics/concept/vmx-overview.html
In which two scenarios is Contrail used? (Choose two.)
- A . private cloud networking
- B . network hardware lifecycle management
- C . Network Functions Virtualization
- D . policy-based routing
Which statement is correct about SDN?
- A . The SDN controller has a centralized view of the network
- B . The SDN controller must provide a manual method for configuration
- C . SDN simplifies the network by combining the control and forwarding planes into a single controller
- D . The configuration and management of an SDN solution should be distributed to the edge of the network
You want to prevent a single point of failure in your underlay network.
Which two protocols would be used to accomplish this task? (choose two)
- A . LACP
- B . VSTP
- C . MC-LAG
- D . RSTP
What are three orchestrators that integrate with Contrail? (Choose three)
- A . VirtualBox
- B . Kubernetes
- C . Ubuntu
- D . OpenStack
- E . vSphere
Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)
- A . TFTP
- B . PCEP
- C . NETCONF
- D . HTTPS
Which two statements are true regarding private cloud services? (Choose two.)
- A . A private cloud must apply encryption to all stored data
- B . A private cloud has dedicated resources for individual customers
- C . A private cloud can be deployed in a service provider network
- D . A private cloud cannot connect to a public cloud
You are required to set up zero-day malware dedication for your private cloud without sending files off site for analysis.
What will accomplish this task?
- A . JATP
- B . IDP
- C . UTM
- D . Sky ATP
What information does an underlay network use to route data?
- A . Application name
- B . Customer ID
- C . IP address
- D . Customer name