Which solution centralizes the management of security devices in your data center?
A. Juniper Networks Secure Analytics
B. J-Web
C. Junos Space Security Director
D. Junos CLI
Which statement is correct about service chaining?
A. Service chaining uses IPsec to connect together two or more VMs
B. Service chaining evaluates traffic by using multiple security features on the same instance
C. Service chaining redirects traffic back through the same device for additional processing
D. Service chaining combines multiple VNF instances together in the data flow
Which two features are used to stop IP spoofing in and out of your network? (Choose two.)
A. GeoIP
B. firewall filters
C. unicast reverse path forwarding
D. IPS
You have a campus location with multiple WAN links. You want to specify the primary link used for your VoIP traffic.
In this scenario, which type of WAN load balancing would you use?
A. BGP
B. OSPF
C. FBF
D. ECMP
Your company has 500 branch sites and the CIO is concerned about minimizing the potential impact of a VPN router being stolen from an enterprise branch site. You want the ability to quickly disable a stolen VPN router while minimizing administrative overhead.
Which solution accomplishes this task?
A. Implement a certificate-based VPN using a public key infrastructure (PKI)
B. Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C. Use firewall filters to block traffic from the stolen VPN router
D. Rotate VPN pre-shared keys every month
You are asked to design a secure enterprise WAN where all payload data is encrypted and branch sites communicate directly without routing all traffic through a central hub.
Which two technologies would accomplish this task? (Choose two.)
A. group VPN
B. AutoVPN
C. MPLS Layer 3 VPN
D. Auto Discovery VPN
In a data center, what are two characteristics of access tier VLAN termination on the aggregation tier? (Choose two.)
A. Multiple VLANs can be part of one security zone
B. A security zone is limited to a single VLAN
C. Inter-VLAN traffic within a zone can bypass firewall services
D. Inter-VLAN traffic is secured through firewall services
You are designing a network management solution that provides automation for Junos devices. Your customer wants to know which solutions would require additional software to be deployed to existing Junos devices.
Which two solutions satisfy this scenario? (Choose two.)
A. SaltStack
B. Ansible
C. Puppet
D. Chef