Which two Juniper NFV products would be used to provide IPsec VPN termination between a public cloud provider and your network? (Choose two)
A. vQFX
B. vSRX
C. vMX
D. vRR
Which protocol would be used by the NorthStar Controller to learn the topology of the WAN network?
A. IS-IS
B. RIP
C. PCEP
D. MPLS
A Contrail controller is used in which type of SDN?
A. OpenFlow-based SDN
B. SDN as an underlay
C. SDN as an overlay
D. API-based SDN
What are two protocols NorthStar uses to provision LSPs? (Choose two)
A. IF-MAP
B. XMPP
C. PCEP
D. NETCONF
According to Juniper Networks, what are two recommended interior routing protocols for the underlay network? (Choose two)
A. IS-IS
B. RIP
C. OSPF
D. EIGRP
Which Juniper product is designed to generate threat containment data and continuously monitor network traffic for security threat activity?
A. Policy Enforcer
B. AppFormix
C. Cyphort
D. Network Director
What are two characteristics of an overlay network in a cloud networking data center? (Choose two)
A. An overlay network provides physical connectivity between hosts
B. An overlay network uses Layer 2 tunneling technologies to interconnect hosts
C. An overlay network must reside in virtual machines within the data center
D. An overlay network provides logical connectivity between tenant networks
Which API does CSO use to connect with a service provider's OSS/BSS?
A. Configuration API
B. JET API
C. Analytics API
D. RESTful API
A customer wants to deploy a complicated service and needs complete control of all applications, servers,
and server operating systems.
Which type of service should the customer purchase in this scenario?
A. FWaaS
B. SaaS
C. PaaS
D. IaaS
Which statement is true regarding Layer 3 underlay fabric networks?
A. Layer 3 underlay fabric networks can only be used across public networks
B. Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenants
C. Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocols
D. Layer 3 underlay fabric networks are more scalable than Layer 2 fabric underlay networks