You are deploying a Layer 2 underlay network with 2,000 devices and hosts. Which two statements are correct? (Choose two.)
A.
The MAC tables can become very large and unmanageable.
B.
RPF is used for loop prevention.
C.
Network routing tables can become very large and unmanageable.
D.
RSTP can be used for loop prevention.
Answer:
ad
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
Which two statements are true about cSRX firewalls? (Choose two.)
A.
The cSRX uses static CPU reservations.
B.
The cSRX does not use static CPU reservations.
C.
The host OS and image OS must match.
D.
The host OS can be different from the guest OS.
Answer:
bc
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which CSO component enables ISPs to set up and manage the virtual network and customers?
A.
Administration Portal
B.
Customer Portal
C.
Designer Tools
D.
Service and Infrastructure Monitor
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which Juniper product provides insight into the underlay and overlay network at the same time?
A.
Juniper Extension Toolkit
B.
Security Director
C.
AppFormix
D.
Edge Services Director
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
What are two objectives of SDN? (Choose two.)
A.
physical separation of the control plane from the data plane
B.
centralization of the forwarding plane
C.
centralization of the services plane
D.
centralization of the control plane
Answer:
ad
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Which two capabilities are supported with the cSRX firewall? (Choose two.)
A.
IPS
B.
routing instances
C.
Layer 2 deployment
D.
chassis clustering
Answer:
ad
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
According to Juniper Networks, what is the recommended external routing protocol for the underlay network?
A.
OSPF
B.
BGP
C.
EGP
D.
IS-IS
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What are two protocols used by the NorthStar Controller to discover the network topology? (Choose two.)
A.
OSPF-TE
B.
NETCONF
C.
SNMP
D.
BGP-LS
Answer:
ad
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an Internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?
A.
Contrail Cloud
B.
Contrail SD-WAN
C.
AppFormix
D.
NorthStar
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
In which two scenarios is Contrail used? (Choose two.)