According to the juniper network, what is the recommended external routing protocol for the underlay network?
A. IS-IS
B. EGP
C. OSPF
D. BGP
Which cloud CPE component manages the end-to-end path from the CPE to the central office or to another CPE?
A. service orchestration
B. infrastructure orchestration
C. physica telco cloud infrastructure
D. virtual network functions
Which two Juniper devices are used as a CSO CPE devices? (Choose two.)
A. SRX
B. NFX
C. QFX
D. MX
You are responsible for optimizing a global MPLS WAN. You must determine the optimal MPLS forwarding paths and automate the provisioning of the forwarding paths into the network.
Which Juniper Networks SDN solution will satisfy the requirements?
A. NorthStar Controller
B. Policy Enforcer
C. Contrail
D. Network Director
Exhibit:
Which type of SDN is shown in the exhibit?
A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay
A customer is planning a significant upgrade to their network that requires an increase in bandwidth.
They want to schedule the increase for a specific date and time.
Which feature within the NorthStar controller allows you to automate this process?
A. LSP and Link Statistics
B. Maintenance Mode
C. Bandwidth Calendaring
D. NorthStar Planner
You are using the Juniper connected security solution to protect your network from malware.
However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of
analyzing files greater than 10MB.
Which two components would allow you to accomplish this task ? (Choose two)
A. REST API server
B. Fabric Manager
C. VIM director
D. Security director
Which OpenStack component is responsible for user authentication and authorization?
A. Glance
B. Nova
C. Keystone
D. Neutron
Which statement is true about the vSRX Series and VMware NSX integration?
A. The NSX Distributed Firewall provides a container based layer of protection.
B. VMware NSX provides advanced Layer 4 through Layer 7 security services.
C. You can add the vSRX virtual firewall as security element in the VMware NSX environment.
D. The NSX Distributed Firewall users application identification.
What are two major components of the NorthStar Controller system? (Choose two.)
A. PCE
B. PCC
C. CE
D. vPE