What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)
What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)A . A vMX provides more routing features. B. A vMX accelerates adding new services C. A vMX has a lower barrier of entry D. A vMX increases analytic capabilitiesView AnswerAnswer: B,C...
What will accomplish this task?
You are required to set up zero-day malware dedication for your private cloud without sending files off site for analysis. What will accomplish this task?A . JATP B. IDP C. UTM D. Sky ATPView AnswerAnswer: D
Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)
Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)A . MC-LAG B. BGPC. LACP C. TRILLView AnswerAnswer: A,C
Which mechanism allows tenants to interconnect across an overlay network?
Which mechanism allows tenants to interconnect across an overlay network?A . tunnels B. subnets C. EBGP connections D. P2P OSPF adjacenciesView AnswerAnswer: A
Which statement is true about Junos Space security director?
Which statement is true about Junos Space security director?A . Security director is a standalone management platform B. Security director is a centralized security policy manager C. Security director is an SDN controller D. Security director is a network orchestratorView AnswerAnswer: B
Which statement is correct about SDN?
Which statement is correct about SDN?A . The SDN controller has a centralized view of the network B. The SDN controller must provide a manual method for configuration C. SDN simplifies the network by combining the control and forwarding planes into a single controller D. The configuration and management of...
Which CSO component enables ISPs to set up and manage the virtual network and customers?
Which CSO component enables ISPs to set up and manage the virtual network and customers?A . Service and Infrastructure Monitor B. Designer Tools C. Administration Portal D. Customer PortalView AnswerAnswer: C
Which two protocols would be used to accomplish this task?
You want to prevent a single point of failure in your underlay network. Which two protocols would be used to accomplish this task? (choose two)A . LACP B. VSTP C. MC-LAG D. RSTPView AnswerAnswer: A,C
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?A . service orchestration B. infrastructure orchestration C. physic a telco cloud infrastructure D. virtual network functionsView AnswerAnswer: A
Which statement is true regarding Layer 3 underlay fabric networks?
Which statement is true regarding Layer 3 underlay fabric networks?A . Layer 3 underlay fabric networks can only be used across public networks B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols D....