The document contains questions and answers about networking and cloud computing technologies. It covers topics like VPN, SDN, NFV, private cloud, public cloud, and virtual network functions. The questions test knowledge of protocols, platforms, services and concepts related to these technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
110 views
Selected Answer Correct
The document contains questions and answers about networking and cloud computing technologies. It covers topics like VPN, SDN, NFV, private cloud, public cloud, and virtual network functions. The questions test knowledge of protocols, platforms, services and concepts related to these technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11
Which secure VPN technology is used for hybrid cloud connectivity
over the public Internet?
Selected Answer IPsec VPN Correct IPsec VPN Juniper Networks supports which two alternatives to Layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two.) Selected Answer LACP MC-LAG Correct LACP MC-LAG Which protocol establishes VXLAN tunnels? Selected Answer EVPN Correct EVPN Which type of service would allow you to provision five servers with Windows Server 2016 installed? Selected Answer PaaS Correct PaaS What are two characteristics of a data center underlay network? (Choose two.) Selected Answer spine network device redundancy fast failover Correct spine network device redundancy fast failover What are two concepts of a private cloud? (Choose two.) Selected Answer Resources are dedicated to your organization. Resources are accessed through a private connection. Correct Resources are dedicated to your organization. Resources are accessed through a private connection. According to Juniper Networks, what is the recommended external routing protocol for the underlay network? Selected Answer BGP Correct BGP What are three software suites that contribute to cloud architectures? (Choose three.) Selected Answer OpenStack Kubernetes vSphere Correct OpenStack Kubernetes vSphere What information does an underlay network use to route data? Selected Answer IP address Correct IP address A customer wants to deploy a website that can scale as needed. Which type of service should the customer purchase in this scenario? Selected Answer SaaS Correct SaaS Which two statements are true regarding private cloud services? (Choose two.) Selected Answer A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Correct A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Which platform is certified to interoperate with VMware NSX? Selected Answer QFX Series Correct QFX Series What are two reasons to deploy a private cloud? (Choose two.) Selected Answer to protect sensitive data to provide cloud-based services within an organization Correct to protect sensitive data to provide cloud-based services within an organization Which two platforms share the same automation scripts? (Choose two.) Selected Answer MX Series vMX Series Correct MX Series vMX Series What are two components of the ETSI Management and Orchestration (MANO) framework? (Choose two.) Selected Answer virtualized network function manager (VNFM) fault, configuration, accounting, performance, and security (FCAPS) manager Correct virtualized network function manager (VNFM) Network Functions Virtualization (NFV) orchestrator Your engineering team has identified a problem. Whenever an application becomes popular, the resulting high-traffic load on the VNFs leads to user dissatisfaction. Which Contrail feature would be used to solve this problem? Selected Answer service scaling Correct service scaling Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization? Selected Answer Network Service Activator Correct Network Service Activator Which statement is correct about a VNF? Selected Answer A VNF is a virtual entity that can be launched and managed. Correct A VNF is a virtual entity that can be launched and managed. The vMX Series provides which two benefits? (Choose two.) Selected Answer The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. Correct The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (Choose two.) Selected Answer performance lite Correct performance lite Which two statements are true about the Juniper Networks implementation of VNFs and NFV? (Choose two.) Selected Answer VNFs incorporate cloud and virtualization technologies to drive new network services with elastic scale and automation. NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. Correct NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. Which statement is true about NFV containers? Selected Answer NFV containers usually provide fewer functions than VM-based VNFs. Correct NFV containers usually provide fewer functions than VM-based VNFs. Which two Juniper Networks virtualized products are available for use in the public cloud? (Choose two.) Selected Answer vSRX vMX Correct vSRX vMX Which OpenStack component is responsible for user authentication and authorization? Selected Answer Keystone Correct Keystone Which two statements are true regarding an SDN controller? (Choose two.) Selected Answer An SDN controller stores and manages software images. An SDN controller centralizes control and configuration of a network. Correct An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Which statement is true regarding an OpenFlow controller-based software defined network? Selected Answer The forwarding plane of each device in the network is programmed by the controller. Correct The forwarding plane of each device in the network is programmed by the controller. Which protocol is used to communicate management information between a VMware NSX controller and a Junos Layer 2 gateway? Selected Answer OVSDB Correct OVSDB Which statement is true about the vSRX Series and VMware NSX integration? Selected Answer You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Correct You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers? Selected Answer Connectivity Services Director Correct Network Director Which two compute hypervisors are supported for Contrail? (Choose two.) Selected Answer ESXi KVM Correct ESXi KVM Which open source management framework does VMware NSX use to manage VXLANs on a Junos device? Selected Answer OVSDB Correct OVSDB Which two products are required when deploying vSRX as a partner security service in VMware NSX? (Choose two.) Selected Answer Junos Space Security Director VMware NSX Manager Correct Junos Space Security Director VMware NSX Manager Which type of SDN is referred to as the original form of SDN? Selected Answer OpenFlow-based SDN Correct OpenFlow-based SDN In which two scenarios is Contrail used? (Choose two.) Selected Answer Network Functions Virtualization private cloud networking Correct Network Functions Virtualization private cloud networking Which protocol is used to communicate LSP and status information between the NorthStar Controller and label edge routers? Selected Answer PCEP Correct PCEP Which protocol is required for NorthStar to establish paths between PE devices? Selected Answer RSVP-TE Correct RSVP-TE What are two ways that WANDL constructs topologies? (Choose two.) Selected Answer Imports configuration files. Enters data manually. Correct Imports configuration files. Enters data manually. What are two major components of the NorthStar Controller system? (Choose two.) Selected Answer PCE PCC Correct PCE PCC Which statement describes the role of the NorthStar Controller? Selected Answer It is an SDN WAN controller. Correct It is an SDN WAN controller. Which two statements are true regarding SDN WAN implementations? (Choose two.) Selected Answer SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Correct SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Which method does WANDL use to collect live network information? Selected Answer SNMP Correct SNMP Which SDN product is used to manage and optimize MPLS WAN connections? Selected Answer NorthStar Correct NorthStar What is a supported data model for the Juniper Telemetry Interface? Selected Answer OpenConfig data model Correct OpenConfig data model Which product in the Juniper Networks portfolio provides accounting and planning information for users by using big data analytics and machine learning? Selected Answer AppFormix Correct AppFormix Which protocol is used to transport monitoring data in Juniper's open and extensible data model? Selected Answer UDP Correct UDP Which two features does the Junos Telemetry Interface (JTI) support? (Choose two.) Selected Answer JTI provides real-time reporting. JTI can stream in multiple message formats. Correct JTI provides real-time reporting. JTI can stream in multiple message formats. Which two tasks do Contrail analytic nodes perform? (Choose two.) Selected Answer Collects system state information. Raises rule-based alerts. Correct Collects system state information. Raises rule-based alerts. From where does AppFormix gather performance metrics in a network? Selected Answer from an agent on a host or system Correct from an agent on a host or system AppFormix alarm notifications are sent to an HTTP server using which format? Selected Answer JSON Correct JSON Which statement is true about CSO? Selected Answer CSO is ETSI compliant. Correct CSO is ETSI compliant. Which statement is correct when describing a centralized cloud CPE model? Selected Answer Physical CPE devices are not required at the customer's office. Correct Physical CPE devices are not required at the customer's office. Which statement is true about Juniper Networks distributed Cloud CPE deployment model?" Selected Answer VNFs are managed by the Contrail Cloud platform. Correct VNFs are stored on CPEs at the customer branch offices. Which statement is true about the Juniper Networks centralized Cloud CPE deployment model? Selected Answer VNFs are stored as VMs at a centralized data center. Correct VNFs are stored as VMs at a centralized data center. Which CSO component enables ISPs to set up and manage the virtual network and customers? Selected Answer Administration Portal Correct Administration Portal Which CSO component enables customers to manage sites and services for their organizations? Selected Answer Customer Portal Correct Customer Portal Which CSO component enables ISPs to design, create, manage, and configure network services that are stored in the network service catalog? Selected Answer Visual Designer Tools Correct Visual Designer Tools Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution? Selected Answer Service and Infrastructure Monitor Correct Service and Infrastructure Monitor Which feature set of the vSRX allows you to monitor application usage to identify highrisk applications and analyze traffic patterns? Selected Answer AppTrack Correct AppTrack Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)" Selected Answer pay as you go bring your own license Correct pay as you go bring your own license What are two goals of Software-Defined Secure Network architectures? (Choose two.) Selected Answer to automate responses to detected security threats to transition all security functions to cloud platforms Correct to centrally manage security policies to automate responses to detected security threats What are two roles of sandboxing in Sky ATP? (Choose two.) Selected Answer to analyze the behavior of potential security threats to store infected files for further analysis Correct to analyze the behavior of potential security threats to store infected files for further analysis Which two actions would Policy Enforcer take when it determines a user has downloaded a file containing malware? (Choose two.) Selected Answer Send an e-mail to the user with a warning. Increase the threat score of the user. Correct Block the user from accessing the network. Put the user in a quarantine VLAN. What are two components of the Juniper Networks SDSN solution? (Choose two.) Selected Answer centralized management enforcement everywhere on the network Correct centralized management enforcement everywhere on the network Which statement is true about Junos Space Security Director? Selected Answer Security Director is an SDN controller. Correct Security Director is a centralized security policy manager. Which Juniper product provides insight into the underlay and overlay network at the same time? Selected Answer Contrail Analytics Correct Contrail Analytics