Which two actions accomplish this task?

Referring to the exhibit, Server-1 has an infection and is communicating with a command and control server on the internet. You want to ensure that the infection on server-1 does not infect server-2. Which two actions accomplish this task? (Choose two)A . Deploy Sky ATP with C&C protection.B . Deploy...

November 6, 2020 No Comments READ MORE +

Which type of topology is shown in the exhibit.

Which type of topology is shown in the exhibit.A . Spine-and-leaf topologyB . Tree topologyC . ERP topologyD . Hub-and-spoke topologyView AnswerAnswer: A

November 5, 2020 No Comments READ MORE +

Which two statement are correct?

You are deploying a layer 2 underlay network with 2,000 devices and hosts. Which two statement are correct? (Choose two).A . RSTP can used for loop preventionB . Network routing tables can become very large and unmanageableC . The MAC tables can become very large and unmanageableD . RPF is...

November 5, 2020 No Comments READ MORE +

Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)

Which two protocols would be used by the NorthStar controller to provision tunnels on an edge router? (choose two)A . TFTPB . PCEPC . NETCONFD . HTTPSView AnswerAnswer: B, C

November 5, 2020 No Comments READ MORE +

Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)

Which two statement are correct when using the native sensors model for juniper telemetry interface with AppFormix? (Choose two)A . Telemetry data is exported from the control planeB . Additional software must be installed on the Junos deviceC . Telemetry data is exported from the data planeD . No additional...

November 5, 2020 No Comments READ MORE +

Which statement is true regarding an OpenFlow controller-based software defined network?

Which statement is true regarding an OpenFlow controller-based software defined network?A . The forwarding plane of each device in the network is programmed by the controllerB . The control plane of each device in the network is instantiated by the controllerC . The SDN controller pushes configuration files to each...

October 17, 2020 No Comments READ MORE +

Which two capabilities are supported with the cSRX firewall? (choose two)

Which two capabilities are supported with the cSRX firewall? (choose two)A . IPSB . routing instancesC . chassis clusteringD . Layer 2 deploymentView AnswerAnswer: A, C

October 17, 2020 No Comments READ MORE +

According to the juniper network, what is the recommended external routing protocol for the underlay network?

According to the juniper network, what is the recommended external routing protocol for the underlay network?A . IS-ISB . EGPC . OSPFD . BGPView AnswerAnswer: D

October 16, 2020 No Comments READ MORE +

In this scenario, which product would satisfy the requirement?

You have 100 small branch offices around the world. You must use a single pane of glass to monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum errors, and ports with maximum packet loss In this scenario, which product would satisfy the requirement?A . Contrail...

October 15, 2020 No Comments READ MORE +

In this scenario, which security technology should you use to stop this behavior?

Devices in your data center have become unwilling participants of botnet attacks. In this scenario, which security technology should you use to stop this behavior?A . Policy EnhancerB . Sky ATP GeoIP threat protectionC . Sky ATP C&C threat protectionD . IPsecView AnswerAnswer: C

October 14, 2020 No Comments READ MORE +