You need to find a product that will allow for the deployment of security devices to a new tenant edge
network in less than one second.
Which product accomplishes this task?
A. MX
B. NFX
C. vSRX
D. cSRX
What are three orchestrators that integrate with Contrail? (Choose three)
A. VirtualBox
B. Kubernetes
C. Ubuntu
D. OpenStack
E. vSphere
Your company has three connections consisting of MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links. Which product will facilitate this requirement?
A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN
You are required to set up zero-day malware dedication for your private cloud without sending files off site
for analysis.
What will accomplish this task?
A. JATP
B. IDP
C. UTM
D. Sky ATP
Which two statements are true about cSRX firewalls? (Choose two.)
A. The host OS can be different from the guest OS
B. The host OS and image OS must match
C. The cSRX does not use static CPU reservations
D. The cSRX uses static CPU reservations
What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)
A. A vMX provides more routing features.
B. A vMX accelerates adding new services
C. A vMX has a lower barrier of entry
D. A vMX increases analytic capabilities
Exhibit: Which type of the topology is shown in the exhibit?
A. EGP topology
B. spine-and-leaf topology
C. tree topology
D. hub-and-spoke topology
Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director
You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an Internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?
A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN
Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
Which type of API does contrail service orchestration provide when connecting with OSS and BSS applications?
A. TLS
B. REST
C. XMPP
D. SOAP
What are two concepts of private cloud? (Choose two)
A. Resources are dedicated to your organization
B. Resources are accessed through a private connection
C. Non-critical resources are located outside of your organization
D. Resources are not secured by firewalls
Which organization is responsible for defining cloud computing?
A. IEEE
B. ANSI
C. NIST
D. IANA
What information does an underlay network use to route data?
A. Application name
B. Customer ID
C. IP address
D. Customer name
Which statement is true about NFV containers?
A. NFV containers usually provide fewer functions than VM-based NFs
B. NFV containers require an underlying hypervisor for deployment
C. NFV containers take longer to instantiate than virtual machines
D. NFV containers require more memory and storage resources to deploy