Which two products are considered SDN controllers? (Choose two)
A. VMware NSX
B. AppFormix
C. Junos Space
D. Contrail Networking
Which two Juniper NFV products would be used to provide IPsec VPN termination between a public cloud provider and your network? (Choose two)
A. vQFX
B. vSRX
C. vMX
D. vRR
You have a data center switching fabric that is comprised of Junos switches. You are using an API-based
SDN implementation to manage the devices.
In this scenario, which statement is true?
A. The control plane is managed on the SDN controller
B. The control and forwarding planes are separated
C. The SDN controller makes routing and forwarding decisions
D. The control plane remains on the individual devices
What are two roles of the NorthStar? (Choose two)
A. to push endpoint device images to customer edge devices
B. to distribute routing updates to network devices
C. to optimize paths through the network based on traffic statistics
D. to calculate paths through the network based on topology information
Which statement is true regarding SDN implementations?
A. SDN centralizes the control plane of network devices
B. SDN can only be used in data center environments
C. SDN centralizes the data plane of network devices
D. SDN is a requirement for hybrid cloud environments
Which platform allows you to monitor any application instance in hybrid, public, private, and telco clouds simultaneously?
A. Junos Space SDK
B. Connectivity Services Director
C. AppFormix
D. Contrail Cloud
What are two core projects in OpenStack? (Choose two)
A. Docker
B. Mesosphere
C. Glance
D. Nova
What are two protocols NorthStar uses to provision LSPs? (Choose two)
A. IF-MAP
B. XMPP
C. PCEP
D. NETCONF
Which Juniper product is designed to generate threat containment data and continuously monitor network traffic for security threat activity?
A. Policy Enforcer
B. AppFormix
C. Cyphort
D. Network Director
What are two characteristics of an overlay network in a cloud networking data center? (Choose two)
A. An overlay network provides physical connectivity between hosts
B. An overlay network uses Layer 2 tunneling technologies to interconnect hosts
C. An overlay network must reside in virtual machines within the data center
D. An overlay network provides logical connectivity between tenant networks