What are two characteristics of Policy Enforcer? (Choose two)
What are two characteristics of Policy Enforcer? (Choose two)A . Policy Enforcer has its own standalone GUIB . Policy Enforcer consolidated threat information from multiple sourcesC . Policy Enforcer provides telemetry data for a collector deviceD . Policy Enforcer is integrated with Security DirectorView AnswerAnswer: B,D
What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)
What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)A . SNMPB . OSPF-TEC . NETCONFD . BGP-LSView AnswerAnswer: B,D
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?A . service orchestrationB . infrastructure orchestrationC . physic a telco cloud infrastructureD . virtual network functionsView AnswerAnswer: A
In which two scenarios is Contrail used? (Choose two.)
In which two scenarios is Contrail used? (Choose two.)A . private cloud networkingB . network hardware lifecycle managementC . Network Functions VirtualizationD . policy-based routingView AnswerAnswer: A,C
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).A . JTI provides real-time telemetry.B . JTI does not need a collector to store dataC . JTI requires no configurationD . JTI can stream in multiple data modelsView AnswerAnswer: A,D
What are two roles of sandboxing in Sky ATP? (choose two)
What are two roles of sandboxing in Sky ATP? (choose two)A . To test the operation of security rulesB . To analyze the behavior of potential security threatsC . To validate the operation of third-party componentsD . To store infected files for further analysisView AnswerAnswer: B,D
What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)
What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)A . A vMX provides more routing features.B . A vMX accelerates adding new servicesC . A vMX has a lower barrier of entryD . A vMX increases analytic capabilitiesView AnswerAnswer: B,C...
Which statement is true about Junos Space security director?
Which statement is true about Junos Space security director?A . Security director is a standalone management platformB . Security director is a centralized security policy managerC . Security director is an SDN controllerD . Security director is a network orchestratorView AnswerAnswer: B
Which statement is true regarding Layer 3 underlay fabric networks?
Which statement is true regarding Layer 3 underlay fabric networks?A . Layer 3 underlay fabric networks can only be used across public networksB . Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenantsC . Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocolsD ....
Which two statements describe cloud CPE? (Choose two.)
Which two statements describe cloud CPE? (Choose two.)A . Cloud CPE require heavy investment in vendor-specific hardwareB . Cloud CPE encourages administrators to use all-in-one appliancesC . Cloud CPE allows multivendor, open support of software-based functionsD . Cloud CPE eliminates the need for investing in expensive hardwareView AnswerAnswer: B,D