Devices in your data center have become unwilling participants of botnet attacks. In this scenario, which security technology should you use to stop this behavior?
A. Policy Enhancer
B. Sky ATP GeoIP threat protection
C. Sky ATP CandC threat protection
D. IPsec
Which protocol is used by the NorthStar Controller to discover existing tunnels in a service provider or large enterprise WAN?
A. SNMP
B. PCEP
C. REST
D. NETCONF
Which two statements describe cloud CPE? (Choose two.)
A. Cloud CPE require heavy investment in vendor-specific hardware
B. Cloud CPE encourages administrators to use all-in-one appliances
C. Cloud CPE allows multivendor, open support of software-based functions
D. Cloud CPE eliminates the need for investing in expensive hardware
AppFormix has been deployed in your data center using the Juniper Telemetry Interface(JTI) native sensors. However, the underlay devices have not yet been set up to work with the JTI native sensors. Which action is required for the JTI native sensors to work properly?
A. Install the AppFormix network agent on the underlay devices
B. Enable NETCONF over SSH on the underlay devices
C. Enable SSH on the underlay devices
D. Enable GPB messaging on the underlay devices
Your company has three connections consisting of MPLS, Internet, and wireless connections, respectively. You must separate traffic according to the type of application sending that traffic across the three links. Which product will facilitate this requirement?
A. Contrail SD-WAN
B. Contrail Cloud
C. Contrail networking
D. Contrail SD-LAN
AppFormix alarm notification are sent to an HTTP server using which format?
A. plain text
B. XML
C. CSV
D. JSON
Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization?
A. Contrail Service Orchestration
B. Contrail Security
C. Virtual Route Reflector
D. Junos Space Security Director
What are two characteristics of cloud computing? (Choose two.)
A. customer-owned equipment
B. measured service
C. resource pooling
D. unrestricted public access to all resources
A customer want to deploy a website that can scale as needed.
Which type of services should the customer purchase in this scenario?
A. DBaaS
B. SaaS
C. BGPaaS
D. FWaaS
Which cloud architecture provides developers a framework on which to develop and customize applications?
A. DBaaS
B. PaaS
C. IaaS
D. FWaaS
Which OpenStack service manage image storage?
A. Glance
B. Swift
C. Nova
D. Heat
Which message type is supported by the Junos Telemetry interface?
A. GPB
B. OpenShift
C. JET
D. YANG
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
Which two statement are true about SDN WAN implementations? (Choose two)
A. SDN WAN uses VXLAN to connect POPs
B. SDN WAN uses data center orchestration platforms
C. SDN WAN uses a centralized a control plane
D. SDN WAN uses MPLS tunnels to connect POPs
Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron