The NorthStar Controller has identified a shared risk in the network. Which statement is true in this scenario?
A. Multiple LSPs cross the same path
B. A customer's VNF is at risk of failing
C. The NorthStar Controller is detecting database errors
D. A PE device hosts multiple edge customers
What are two roles of the NorthStar? (Choose two)
A. to push endpoint device images to customer edge devices
B. to distribute routing updates to network devices
C. to optimize paths through the network based on traffic statistics
D. to calculate paths through the network based on topology information
Which statement is true regarding SDN implementations?
A. SDN centralizes the control plane of network devices
B. SDN can only be used in data center environments
C. SDN centralizes the data plane of network devices
D. SDN is a requirement for hybrid cloud environments
Which platform allows you to monitor any application instance in hybrid, public, private, and telco clouds simultaneously?
A. Junos Space SDK
B. Connectivity Services Director
C. AppFormix
D. Contrail Cloud
Which two statements are true regarding the NorthStar Controller API? (Choose two)
A. The southbound interface connects to routers and switches using IS-IS, OSPFv2, BGP-LS, and PCEP protocols
B. The southbound interface is a RESTful implementation that can be programmed with a programming language
C. The northbound interface connects to routers and switches using IS-IS, OSPFv2, BGP-LS, and PCEP protocols
D. The northbound interface is a RESTful implementation that can be programmed with a programming language
Which statement is true regarding a hybrid cloud?
A. A hybrid cloud must constitute at least three multi-cloud interconnections
B. A hybrid cloud spans at least one public and one private cloud
C. A hybrid cloud must span at least two public clouds
D. A hybrid cloud only has an on-premises virtualization environment
Which Juniper product is designed to generate threat containment data and continuously monitor network traffic for security threat activity?
A. Policy Enforcer
B. AppFormix
C. Cyphort
D. Network Director
Which protocol would you use to share IP and MAC information in the overlay network?
A. OSPF
B. IS-IS
C. EVPN
D. IGMP
Which Juniper virtual platform is designed to operate in an isolated Linux environment directly on the host server?
A. VRR
B. vSRX
C. vMX
D. vSRX
Which statement is true about the OpenConfig data model?
A. It supports YANG
B. It provides UDP-based transport
C. It is embedded in all devices that run the Junos OS
D. It uses MySQL as the default database structure