Which two actions accomplish this task?
Referring to the exhibit, Server-1 has an infection and is communicating with a command and control server on the internet. You want to ensure that the infection on server-1 does not infect server-2. Which two actions accomplish this task? (Choose two)A . Deploy Sky ATP with C&C protection.B . Deploy...
Which type of topology is shown in the exhibit.
Which type of topology is shown in the exhibit.A . Spine-and-leaf topologyB . Tree topologyC . ERP topologyD . Hub-and-spoke topologyView AnswerAnswer: A
Which two statement are correct?
You are deploying a layer 2 underlay network with 2,000 devices and hosts. Which two statement are correct? (Choose two).A . RSTP can used for loop preventionB . Network routing tables can become very large and unmanageableC . The MAC tables can become very large and unmanageableD . RPF is...
Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)
Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)A . TFTPB . PCEPC . NETCONFD . HTTPSView AnswerAnswer: B, C
Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)
Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)A . Telemetry data is exported from the control planeB . Additional software must be installed on the Junos deviceC . Telemetry data is exported from the data planeD . No additional...
Which statement is true regarding an OpenFlow controller-based software defined network?
Which statement is true regarding an OpenFlow controller-based software defined network?A . The forwarding plane of each device in the network is programmed by the controllerB . The control plane of each device in the network is instantiated by the controllerC . The SDN controller pushes configuration files to each...
Which two capabilities are supported with the cSRX firewall? (choose two)
Which two capabilities are supported with the cSRX firewall? (choose two)A . IPSB . routing instancesC . chassis clusteringD . Layer 2 deploymentView AnswerAnswer: A, C
According to the juniper network, what is the recommended external routing protocol for the underlay network?
According to the juniper network, what is the recommended external routing protocol for the underlay network?A . IS-ISB . EGPC . OSPFD . BGPView AnswerAnswer: D
In this scenario, which product would satisfy the requirement?
You have 100 small branch offices around the world. You must use a single pane of glass to monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum errors, and ports with maximum packet loss In this scenario, which product would satisfy the requirement?A . Contrail...
In this scenario, which security technology should you use to stop this behavior?
Devices in your data center have become unwilling participants of botnet attacks. In this scenario, which security technology should you use to stop this behavior?A . Policy EnhancerB . Sky ATP GeoIP threat protectionC . Sky ATP C&C threat protectionD . IPsecView AnswerAnswer: C