Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?
A. service orchestration
B. infrastructure orchestration
C. physica telco cloud infrastructure
D. virtual network functions
Exhibit:
Which type of SDN is shown in the exhibit?
A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay
Which two statements are true about an SDN controller? (Choose two.)
A. An SDN controller automates repetitive tasks in a network
B. An SDN controller regulates traffic transmission rates in a network
C. An SDN controller centralizes control and configuration of a network
D. An SDN controller stores and manages software mages
What are two examples of public cloud providers? (Choose two.)
A. eBay
B. Netflix
C. Microsoft Azure
D. Amazon Web Services
You want to automate the management of virtualized applications using Contrail Networking. Which type of SDN is used in this scenario?
A. OpenFlow SDN
B. API SDN
C. Overlay SDN
D. Ansible Automation
Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director
You are the administrator of an MPLS WAN. Intermittent WAN hardware failures are causing customer traffic to route over newly computed forwarding paths that do not satisfy service level agreements. Which Juniper Networks solution would be used to analyze this problem?
A. Network Director
B. AppFormix
C. NorthStar Planner
D. Contrail
Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
What is used to provide secure access to a vSRX in a public cloud?
A. authorized key pairs
B. SSH key pairs
C. private key pairs
D. public key pairs
What are two roles of sandboxing in Sky ATP? (Choose two)
A. To test the operation of security rules
B. To analyze the behavior of potential security threats
C. To validate the operation of third-party components
D. To store infected files for further analysis