You are deploying a Layer 2 underlay network with 2,000 devices and hosts. Which two statements are correct?
A. Network routing tables can become very large and unmanageable
B. RPF is used for loop prevention
C. The MAC tables can become very large and unmanageable
D. RSTP can be used for loop prevention
What are two protocols used by NorthStar Controller to discover the network topology? (Choose two)
A. SNMP
B. OSPF-TE
C. NETCONF
D. BGP-LS
Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers?
A. Edge Services Director
B. Policy Enforcer
C. Network Director
D. Connectivity Services Director
You are asked to reduce traffic on an MPLS VPN by automatically moving the traffic to an Internet circuit as long as it satisfies the SLA requirements. In this scenario, what would you use to accomplish this task?
A. Contrail Cloud
B. NorthStar
C. AppFormix
D. Contrail SD-WAN
Which two protocols provide loop prevention in underlay network? (Choose two.)
A. OSPF
B. VPLS
C. EVPN
D. MSTP
Which two protocols are used in a Contrail system to exchange routing information? (Choose two)
A. XMPP
B. BGP
C. OSPF
D. IS-IS
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
What are two concepts of private cloud? (Choose two)
A. Resources are dedicated to your organization
B. Resources are accessed through a private connection
C. Non-critical resources are located outside of your organization
D. Resources are not secured by firewalls
Which two components are part of the AppFormix architecture? (Choose two)
A. Policy controller
B. Compute node
C. SDN controller
D. Data platform
Which protocol is used to transport monitoring data in Juniper's open and extensible data model?
A. TCP
B. SNMP
C. SOAP
D. UDP