Which statement is correct when deploying services inside containers?

Which statement is correct when deploying services inside containers?A . Services have dedicated processor and memory resources on each serverB . Services must not be deployed using the same operating systemC . Containers can always be deployed for freeD . Containers use fewer resources then VMsView AnswerAnswer: D

November 10, 2020 No Comments READ MORE +

What are two characteristics of Juniper’s connected security solution? (Choose two)

What are two characteristics of Juniper’s connected security solution? (Choose two)A . Centralized managementB . Manual secure policy controlC . Dynamic VPN connectionD . Enforcement everywhere on the networkView AnswerAnswer: A, D

November 10, 2020 No Comments READ MORE +

Which interface is used by applications, orchestration systems, and other types of business systems to communicate with an SDN controller?

Which interface is used by applications, orchestration systems, and other types of business systems to communicate with an SDN controller?A . Controller interfaceB . Northbound interfaceC . East-west interfaceD . Southbound interfaceView AnswerAnswer: B

November 9, 2020 No Comments READ MORE +

Which protocol is used by the NorthStar controller to discover existing tunnels in a service provider or large enterprise WAN?

Which protocol is used by the NorthStar controller to discover existing tunnels in a service provider or large enterprise WAN?A . SNMPB . RESTC . PCEPD . NETCONFView AnswerAnswer: C, D

November 9, 2020 No Comments READ MORE +

Which product accomplishes this task?

You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second. Which product accomplishes this task?A . NFXB . MXC . cSRXD . vSRXView AnswerAnswer: C

November 8, 2020 No Comments READ MORE +

What are two characteristics of policy Enforcer? (Choose two)

What are two characteristics of policy Enforcer? (Choose two)A . Policy Enforcer has its own standalone GUIB . Policy Enforcer is integrated with security directorC . Policy Enforcer provides telemetry data for a collector deviceD . Policy Enforcer consolidates threat information from multiple sourcesView AnswerAnswer: B, D

November 8, 2020 No Comments READ MORE +

Which Juniper Networks solution would be used to analyze this problem?

You are the administrator of an MPLS WAN intermittent WAN hardware failure are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements. Which Juniper Networks solution would be used to analyze this problem?A . Network directorB . ContrailC . NorthStar PlannerD ....

November 7, 2020 No Comments READ MORE +

What are two objectives of SDN? (Choose two).

What are two objectives of SDN? (Choose two).A . Physical separation of the control plane from the data planeB . Centralization of the forwarding planeC . Centralization of the control planeD . Centralization of the services planeView AnswerAnswer: A, C

November 6, 2020 No Comments READ MORE +

Which two Juniper devices are used as a CSO CPE device? (Choose two).

Which two Juniper devices are used as a CSO CPE device? (Choose two).A . NFXB . SRXC . MXD . QFXView AnswerAnswer: A, B

November 6, 2020 No Comments READ MORE +

Which action is required for the JTI native sensors to work properly?

AppFormix has been deployed in your data center using the Juniper Telemetry interface (JTI) native sensors. However, the underlay devices have not yet been set up to work with the JTI native sensors. Which action is required for the JTI native sensors to work properly?A . Enable the SSH on...

November 6, 2020 No Comments READ MORE +