What are two characteristics of Policy Enforcer? (Choose two)

What are two characteristics of Policy Enforcer? (Choose two)A . Policy Enforcer has its own standalone GUIB . Policy Enforcer consolidated threat information from multiple sourcesC . Policy Enforcer provides telemetry data for a collector deviceD . Policy Enforcer is integrated with Security DirectorView AnswerAnswer: B,D

March 20, 2022 No Comments READ MORE +

What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)

What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)A . SNMPB . OSPF-TEC . NETCONFD . BGP-LSView AnswerAnswer: B,D

March 19, 2022 No Comments READ MORE +

Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?

Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?A . service orchestrationB . infrastructure orchestrationC . physic a telco cloud infrastructureD . virtual network functionsView AnswerAnswer: A

March 19, 2022 No Comments READ MORE +

In which two scenarios is Contrail used? (Choose two.)

In which two scenarios is Contrail used? (Choose two.)A . private cloud networkingB . network hardware lifecycle managementC . Network Functions VirtualizationD . policy-based routingView AnswerAnswer: A,C

March 18, 2022 No Comments READ MORE +

Which two features does the Junos Telemetry interface (JTI) support? (Choose two).

Which two features does the Junos Telemetry interface (JTI) support? (Choose two).A . JTI provides real-time telemetry.B . JTI does not need a collector to store dataC . JTI requires no configurationD . JTI can stream in multiple data modelsView AnswerAnswer: A,D

March 17, 2022 No Comments READ MORE +

What are two roles of sandboxing in Sky ATP? (choose two)

What are two roles of sandboxing in Sky ATP? (choose two)A . To test the operation of security rulesB . To analyze the behavior of potential security threatsC . To validate the operation of third-party componentsD . To store infected files for further analysisView AnswerAnswer: B,D

March 17, 2022 No Comments READ MORE +

What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)

What are two reasons to use a vMX over a physical MX Series devices in your deployment? (Choose two)A . A vMX provides more routing features.B . A vMX accelerates adding new servicesC . A vMX has a lower barrier of entryD . A vMX increases analytic capabilitiesView AnswerAnswer: B,C...

March 17, 2022 No Comments READ MORE +

Which statement is true about Junos Space security director?

Which statement is true about Junos Space security director?A . Security director is a standalone management platformB . Security director is a centralized security policy managerC . Security director is an SDN controllerD . Security director is a network orchestratorView AnswerAnswer: B

March 17, 2022 No Comments READ MORE +

Which statement is true regarding Layer 3 underlay fabric networks?

Which statement is true regarding Layer 3 underlay fabric networks?A . Layer 3 underlay fabric networks can only be used across public networksB . Layer 3 underlay fabric networks rely on IPsec tunnels to interconnect tenantsC . Layer 3 underlay fabric networks rely on Layer 2 loop prevention protocolsD ....

March 17, 2022 No Comments READ MORE +

Which two statements describe cloud CPE? (Choose two.)

Which two statements describe cloud CPE? (Choose two.)A . Cloud CPE require heavy investment in vendor-specific hardwareB . Cloud CPE encourages administrators to use all-in-one appliancesC . Cloud CPE allows multivendor, open support of software-based functionsD . Cloud CPE eliminates the need for investing in expensive hardwareView AnswerAnswer: B,D

March 17, 2022 No Comments READ MORE +