What are two requirements for provisioning a device using ZTP? (Choose two)
A. The network must have a DHCP server
B. The network must support VPN tunnels
C. The network must have a hosted server that stores the device image and configuration
D. The network must have an NTP server
Which two statements are true about a public cloud? (Choose two)
A. Resources are closed to the public
B. Resources are hosted within your organization
C. Resources are shared with other entities
D. Resources are accessed through a public network
What are two roles of the NorthStar? (Choose two)
A. to push endpoint device images to customer edge devices
B. to distribute routing updates to network devices
C. to optimize paths through the network based on traffic statistics
D. to calculate paths through the network based on topology information
What are two benefits of NFV? (Choose two)
A. NFV provides methodologies to interconnect data centers
B. NFV provides control over the deployment of all virtual machines
C. NFV allows for the automated control of service chains
D. NFV makes the management of virtualized network functions dynamic
According to Juniper Networks, what are two recommended interior routing protocols for the underlay network? (Choose two)
A. IS-IS
B. RIP
C. OSPF
D. EIGRP
Which protocol is used to transport data in an overlay network?
A. BGP
B. EVPN
C. OSPF
D. VXLAN
Which Juniper virtual platform is designed to operate in an isolated Linux environment directly on the host server?
A. VRR
B. vSRX
C. vMX
D. vSRX
A customer wants to provide advanced Layer 4 through Layer 7 security services for a VMware NSX
microsegementation deployment.
Which platform would you recommend using in this scenario?
A. ACX Series
B. vMX Series
C. vSRX Series
D. QFX Series