Which security technology should you use to stop this behavior?

Devices in your data center have become unwilling participants of botnet attacks. In this scenario. Which security technology should you use to stop this behavior?A . IPsecB . Policy enforcerC . Sky ATP C&C threat protectionD . Sky ATP GeoIP threat protectionView AnswerAnswer: C

November 19, 2020 No Comments READ MORE +

Which statement describes AppFormix?

Which statement describes AppFormix?A . AppFormix is a high-performance virtual device that secures virtualized and cloud environmentsB . AppFormix is the SDN automation platform for OpenStack IaasC . AppFormix is responsible for monitoring, Analytics and intent-driven infrastructure optimizationD . AppFormix is virtualized full-featured, carrier-grade ideal for NFV environmentsView AnswerAnswer: C

November 19, 2020 No Comments READ MORE +

What are two examples of SaaS ? (choose two).

What are two examples of SaaS ? (choose two).A . Google AppsB . Amazon web servicesC . SalesforceD . IBM cloudView AnswerAnswer: B, C

November 18, 2020 No Comments READ MORE +

What are two protocols used by the NorthStar controller to discover the network topology? (Choose two).

What are two protocols used by the NorthStar controller to discover the network topology? (Choose two).A . SNMPB . BGP-LSC . NETCONFD . OSPF-TEView AnswerAnswer: B, D

November 17, 2020 No Comments READ MORE +

Which statement is correct about SDN?

Which statement is correct about SDN?A . SDN simplifies the network by combining the control and forwarding plane into a single controllerB . The SDN controller must provide a manual method for configurationC . The configuration and management of an SDN solution should be distributed to the edge of the...

November 17, 2020 No Comments READ MORE +

What is and advantage of the Junos Telemetry Interface(JTI) over SNMP?

What is and advantage of the Junos Telemetry Interface(JTI) over SNMP?A . JTI can push data more frequentlyB . JTI can pull data more frequentlyC . JTI always transfer data over HTTPD . JTI never transfers data over UDPView AnswerAnswer: A

November 17, 2020 No Comments READ MORE +

In this scenario, what would you use to accomplish this task?

You are asked to reduce traffic on an MPLS VFN by automatically moving the traffic to an internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?A . NorthStarB . AppFormixC . Contrail cloudD . Contrail SD-WANView AnswerAnswer: A

November 16, 2020 No Comments READ MORE +

which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?A . Service orchestrationB . Virtual network functionsC . Infrastructure orchestrationD . Physical telco cloud infrastructureView AnswerAnswer: A

November 15, 2020 No Comments READ MORE +

Which two virtualized components are required in this scenario?

You are deploying a vMX device in your network. Which two virtualized components are required in this scenario? (choose two)A . Virtual chassis fabricB . Virtual forwarding planeC . Virtual chassis portD . Virtual control planeView AnswerAnswer: B, D

November 15, 2020 No Comments READ MORE +

What are two reason to use a vMX over a physical MX series in your deployment? (Choose two)

What are two reason to use a vMX over a physical MX series in your deployment? (Choose two)A . A vMX provides more routing featuresB . A vMX has a lower barrier of entryC . A vMX accelerates adding new servicesD . A vMX increases analytic capabilitiesView AnswerAnswer: B, C

November 15, 2020 No Comments READ MORE +