0% found this document useful (0 votes)
110 views

Selected Answer Correct

The document contains questions and answers about networking and cloud computing technologies. It covers topics like VPN, SDN, NFV, private cloud, public cloud, and virtual network functions. The questions test knowledge of protocols, platforms, services and concepts related to these technologies.

Uploaded by

dilshad m shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Selected Answer Correct

The document contains questions and answers about networking and cloud computing technologies. It covers topics like VPN, SDN, NFV, private cloud, public cloud, and virtual network functions. The questions test knowledge of protocols, platforms, services and concepts related to these technologies.

Uploaded by

dilshad m shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Which secure VPN technology is used for hybrid cloud connectivity

over the public Internet?


Selected Answer
 IPsec VPN
Correct
 IPsec VPN
Juniper Networks supports which two alternatives to Layer 2 loop
prevention protocols, such as STP, in an underlay network? (Choose
two.)
Selected Answer
 LACP
 MC-LAG
Correct
 LACP
 MC-LAG
Which protocol establishes VXLAN tunnels?
Selected Answer
 EVPN
Correct
 EVPN
Which type of service would allow you to provision five servers with
Windows Server 2016 installed?
Selected Answer
 PaaS
Correct
 PaaS
What are two characteristics of a data center underlay network?
(Choose two.)
Selected Answer
 spine network device redundancy
 fast failover
Correct
 spine network device redundancy
 fast failover
What are two concepts of a private cloud? (Choose two.)
Selected Answer
 Resources are dedicated to your organization.
 Resources are accessed through a private connection.
Correct
 Resources are dedicated to your organization.
 Resources are accessed through a private connection.
According to Juniper Networks, what is the recommended external
routing protocol for the underlay network?
Selected Answer
 BGP
Correct
 BGP
What are three software suites that contribute to cloud
architectures? (Choose three.)
Selected Answer
 OpenStack
 Kubernetes
 vSphere
Correct
 OpenStack
 Kubernetes
 vSphere
What information does an underlay network use to route data?
Selected Answer
 IP address
Correct
 IP address
A customer wants to deploy a website that can scale as needed.
Which type of service should the customer purchase in this scenario?
Selected Answer
 SaaS
Correct
 SaaS
Which two statements are true regarding private cloud services?
(Choose two.)
Selected Answer
 A private cloud can be deployed in a service provider network.
 A private cloud has dedicated resources for individual customers.
Correct
 A private cloud can be deployed in a service provider network.
 A private cloud has dedicated resources for individual customers.
Which platform is certified to interoperate with VMware NSX?
Selected Answer
 QFX Series
Correct
 QFX Series
What are two reasons to deploy a private cloud? (Choose two.)
Selected Answer
 to protect sensitive data
 to provide cloud-based services within an organization
Correct
 to protect sensitive data
 to provide cloud-based services within an organization
Which two platforms share the same automation scripts? (Choose
two.)
Selected Answer
 MX Series
 vMX Series
Correct
 MX Series
 vMX Series
What are two components of the ETSI Management and
Orchestration (MANO) framework? (Choose two.)
Selected Answer
 virtualized network function manager (VNFM)
 fault, configuration, accounting, performance, and security (FCAPS) manager
Correct
 virtualized network function manager (VNFM)
 Network Functions Virtualization (NFV) orchestrator
Your engineering team has identified a problem. Whenever an
application becomes popular, the resulting high-traffic load on the
VNFs leads to user dissatisfaction. Which Contrail feature would be
used to solve this problem?
Selected Answer
 service scaling
Correct
 service scaling
Which Juniper product is used to remotely provision the NFX250
platform for Network Functions Virtualization?
Selected Answer
 Network Service Activator
Correct
 Network Service Activator
Which statement is correct about a VNF?
Selected Answer
 A VNF is a virtual entity that can be launched and managed.
Correct
 A VNF is a virtual entity that can be launched and managed.
The vMX Series provides which two benefits? (Choose two.)
Selected Answer
 The vMX Series uses carrier-grade routing optimized for the x86 environment.
 The vMX Series requires a license for production environments.
Correct
 The vMX Series uses carrier-grade routing optimized for the x86 environment.
 The vMX Series requires a license for production environments.
What are two different modes available for the vMX on KVM that are
based on CPU and memory availability? (Choose two.)
Selected Answer
 performance
 lite
Correct
 performance
 lite
Which two statements are true about the Juniper Networks
implementation of VNFs and NFV? (Choose two.)
Selected Answer
 VNFs incorporate cloud and virtualization technologies to drive new network services
with elastic scale and automation.
 NFV incorporates cloud and virtualization technologies to drive new network services
with elastic scale and automation.
Correct
 NFV incorporates cloud and virtualization technologies to drive new network services
with elastic scale and automation.
 VNFs include all virtual entities that can be launched and managed from the Juniper
Device Manager.
Which statement is true about NFV containers?
Selected Answer
 NFV containers usually provide fewer functions than VM-based VNFs.
Correct
 NFV containers usually provide fewer functions than VM-based VNFs.
Which two Juniper Networks virtualized products are available for
use in the public cloud? (Choose two.)
Selected Answer
 vSRX
 vMX
Correct
 vSRX
 vMX
Which OpenStack component is responsible for user authentication
and authorization?
Selected Answer
 Keystone
Correct
 Keystone
Which two statements are true regarding an SDN controller? (Choose
two.)
Selected Answer
 An SDN controller stores and manages software images.
 An SDN controller centralizes control and configuration of a network.
Correct
 An SDN controller centralizes control and configuration of a network.
 An SDN controller automates repetitive tasks in a network.
Which statement is true regarding an OpenFlow controller-based
software defined network?
Selected Answer
 The forwarding plane of each device in the network is programmed by the controller.
Correct
 The forwarding plane of each device in the network is programmed by the controller.
Which protocol is used to communicate management information
between a VMware NSX controller and a Junos Layer 2 gateway?
Selected Answer
 OVSDB
Correct
 OVSDB
Which statement is true about the vSRX Series and VMware NSX
integration?
Selected Answer
 You can add the vSRX virtual firewall as a security element in the VMware NSX
environment.
Correct
 You can add the vSRX virtual firewall as a security element in the VMware NSX
environment.
Which Junos Space application integrates with both VMware vSphere
and VMware NSX solutions to automate the movement of VLANs
between physical and virtual servers?
Selected Answer
 Connectivity Services Director
Correct
 Network Director
Which two compute hypervisors are supported for Contrail? (Choose
two.)
Selected Answer
 ESXi
 KVM
Correct
 ESXi
 KVM
Which open source management framework does VMware NSX use
to manage VXLANs on a Junos device?
Selected Answer
 OVSDB
Correct
 OVSDB
Which two products are required when deploying vSRX as a partner
security service in VMware NSX? (Choose two.)
Selected Answer
 Junos Space Security Director
 VMware NSX Manager
Correct
 Junos Space Security Director
 VMware NSX Manager
Which type of SDN is referred to as the original form of SDN?
Selected Answer
 OpenFlow-based SDN
Correct
 OpenFlow-based SDN
In which two scenarios is Contrail used? (Choose two.)
Selected Answer
 Network Functions Virtualization
 private cloud networking
Correct
 Network Functions Virtualization
 private cloud networking
Which protocol is used to communicate LSP and status information
between the NorthStar Controller and label edge routers?
Selected Answer
 PCEP
Correct
 PCEP
Which protocol is required for NorthStar to establish paths between
PE devices?
Selected Answer
 RSVP-TE
Correct
 RSVP-TE
What are two ways that WANDL constructs topologies? (Choose two.)
Selected Answer
 Imports configuration files.
 Enters data manually.
Correct
 Imports configuration files.
 Enters data manually.
What are two major components of the NorthStar Controller system?
(Choose two.)
Selected Answer
 PCE
 PCC
Correct
 PCE
 PCC
Which statement describes the role of the NorthStar Controller?
Selected Answer
 It is an SDN WAN controller.
Correct
 It is an SDN WAN controller.
Which two statements are true regarding SDN WAN
implementations? (Choose two.)
Selected Answer
 SDN WAN uses a centralized control plane.
 SDN WAN uses MPLS tunnels to connect POPs.
Correct
 SDN WAN uses a centralized control plane.
 SDN WAN uses MPLS tunnels to connect POPs.
Which method does WANDL use to collect live network information?
Selected Answer
 SNMP
Correct
 SNMP
Which SDN product is used to manage and optimize MPLS WAN
connections?
Selected Answer
 NorthStar
Correct
 NorthStar
What is a supported data model for the Juniper Telemetry Interface?
Selected Answer
 OpenConfig data model
Correct
 OpenConfig data model
Which product in the Juniper Networks portfolio provides accounting
and planning information for users by using big data analytics and
machine learning?
Selected Answer
 AppFormix
Correct
 AppFormix
Which protocol is used to transport monitoring data in Juniper's
open and extensible data model?
Selected Answer
 UDP
Correct
 UDP
Which two features does the Junos Telemetry Interface (JTI) support?
(Choose two.)
Selected Answer
 JTI provides real-time reporting.
 JTI can stream in multiple message formats.
Correct
 JTI provides real-time reporting.
 JTI can stream in multiple message formats.
Which two tasks do Contrail analytic nodes perform? (Choose two.)
Selected Answer
 Collects system state information.
 Raises rule-based alerts.
Correct
 Collects system state information.
 Raises rule-based alerts.
From where does AppFormix gather performance metrics in a
network?
Selected Answer
 from an agent on a host or system
Correct
 from an agent on a host or system
AppFormix alarm notifications are sent to an HTTP server using
which format?
Selected Answer
 JSON
Correct
 JSON
Which statement is true about CSO?
Selected Answer
 CSO is ETSI compliant.
Correct
 CSO is ETSI compliant.
Which statement is correct when describing a centralized cloud CPE
model?
Selected Answer
 Physical CPE devices are not required at the customer's office.
Correct
 Physical CPE devices are not required at the customer's office.
Which statement is true about Juniper Networks distributed Cloud
CPE deployment model?"
Selected Answer
 VNFs are managed by the Contrail Cloud platform.
Correct
 VNFs are stored on CPEs at the customer branch offices.
Which statement is true about the Juniper Networks centralized
Cloud CPE deployment model?
Selected Answer
 VNFs are stored as VMs at a centralized data center.
Correct
 VNFs are stored as VMs at a centralized data center.
Which CSO component enables ISPs to set up and manage the virtual
network and customers?
Selected Answer
 Administration Portal
Correct
 Administration Portal
Which CSO component enables customers to manage sites and
services for their organizations?
Selected Answer
 Customer Portal
Correct
 Customer Portal
Which CSO component enables ISPs to design, create, manage, and
configure network services that are stored in the network service
catalog?
Selected Answer
 Visual Designer Tools
Correct
 Visual Designer Tools
Which CSO component enables the monitoring of the CSO system to
provide real-time data about the Cloud CPE solution?
Selected Answer
 Service and Infrastructure Monitor
Correct
 Service and Infrastructure Monitor
Which feature set of the vSRX allows you to monitor application
usage to identify highrisk applications and analyze traffic patterns?
Selected Answer
 AppTrack
Correct
 AppTrack
Which two pricing models are available from AWS Marketplace for
vSRX consumption? (Choose two.)"
Selected Answer
 pay as you go
 bring your own license
Correct
 pay as you go
 bring your own license
What are two goals of Software-Defined Secure Network
architectures? (Choose two.)
Selected Answer
 to automate responses to detected security threats
 to transition all security functions to cloud platforms
Correct
 to centrally manage security policies
 to automate responses to detected security threats
What are two roles of sandboxing in Sky ATP? (Choose two.)
Selected Answer
 to analyze the behavior of potential security threats
 to store infected files for further analysis
Correct
 to analyze the behavior of potential security threats
 to store infected files for further analysis
Which two actions would Policy Enforcer take when it determines a
user has downloaded a file containing malware? (Choose two.)
Selected Answer
 Send an e-mail to the user with a warning.
 Increase the threat score of the user.
Correct
 Block the user from accessing the network.
 Put the user in a quarantine VLAN.
What are two components of the Juniper Networks SDSN solution?
(Choose two.)
Selected Answer
 centralized management
 enforcement everywhere on the network
Correct
 centralized management
 enforcement everywhere on the network
Which statement is true about Junos Space Security Director?
Selected Answer
 Security Director is an SDN controller.
Correct
 Security Director is a centralized security policy manager.
Which Juniper product provides insight into the underlay and overlay
network at the same time?
Selected Answer
 Contrail Analytics
Correct
 Contrail Analytics

You might also like