Which node in a Contrail cluster graphically maps overlay traffic flows on top of the underlay topology?
Which node in a Contrail cluster graphically maps overlay traffic flows on top of the underlay topology?A . control nodeB . configuration nodeC . analytics nodeD . compute nodeView AnswerAnswer: C
You have a data center switching fabric that is comprised of Junos switches. You are using an API-based SDN implementation to manage the devices. In this scenario, which statement is true?A . The control plane is managed on the SDN controllerB . The control and forwarding planes are separatedC ....
Which two products are considered SDN controllers? (Choose two)A . VMware NSXB . AppFormixC . Junos SpaceD . Contrail NetworkingView AnswerAnswer: C,D
What are two requirements for provisioning a device using ZTP? (Choose two)A . The network must have a DHCP serverB . The network must support VPN tunnelsC . The network must have a hosted server that stores the device image and configurationD . The network must have an NTP serverView...
What are two benefits of cloud automation? (Choose two)A . It simplifies network operations that involve complex configurationsB . It reduces the number of network componentsC . It performs repeatable tasksD . It eliminates all operational configuration errorsView AnswerAnswer: A,C
Which two Juniper NFV products would be used to provide IPsec VPN termination between a public cloud provider and your network? (Choose two)
Which two Juniper NFV products would be used to provide IPsec VPN termination between a public cloud provider and your network? (Choose two)A . vQFXB . vSRXC . vMXD . vRRView AnswerAnswer: B,C
What is a primary function of an underlay network?A . to advertise Internet routes into an overlay networkB . to advertise loopback interfaces to establish an overlay networkC . to advertise server interfaces to establish an overlay networkD . to advertise client host routes into an overlay networkView AnswerAnswer: D
Click the Exhibit button. Exhibit: Which EVPN/VXLAN scenario is shown in the exhibit for QFX5100-1?A . multihomingB . VPLS active-activeC . MSTPD . MC-LAGView AnswerAnswer: A
The NorthStar Controller has identified a shared risk in the network. Which statement is true in this scenario?A . Multiple LSPs cross the same pathB . A customer’s VNF is at risk of failingC . The NorthStar Controller is detecting database errorsD . A PE device hosts multiple edge customersView...
What operates below the virtualization layer in an NFV system?A . The NFV management and orchestration componentsB . the virtualized network functions (VNFs)C . the compute, storage, and network hardwareD . the OSS and BSS management systemsView AnswerAnswer: C