Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Click the Exhibit button.

What will be the result of deploying the Heat template shown in the exhibit?

A.

Neither VM will be deployed.

B.

Only vm_2 will be deployed and vm_1 will be overwritten.

C.

Both vm_1 and vm_2 will be deployed.

D.

Only vm_1 will be deployed and vm_2 will fail.

Full Access
Question # 5

Which statements correct about Contrail security?

A.

Contrail security is used to control access into Junos devices.

B.

Contrail security is used to apply security features and segment traffic flows.

C.

Contrail security is used to analyze network performance and learn traffic patterns.

D.

Contrail security is used to control management access to VNFs.

Full Access
Question # 6

A vRouter includes which two containers? (Choose two.)

A.

nodemgr

B.

dns

C.

api

D.

agent

Full Access
Question # 7

What are three ways to deploy an MX Series device as an SDN gateway? (Choose three.)

A.

Configure it as an L4 gateway.

B.

Configure it as an application gateway.

C.

Configure it as an SDN-to-SDN gateway.

D.

Configure it as an L3 gateway.

E.

Configure it as an L2 gateway.

Full Access
Question # 8

What is the proper order for creating a virtual network?

A.

Configure the IPAM, virtual network, DNS, and then the virtual machine.

B.

Configure the DNS, IPAM, virtual network, and then the virtual machine.

C.

Configure the virtual network, DNS, IPAM, and then the virtual machine.

D.

Configure the IPAM, DNS, virtual network, and then the virtual machine.

Full Access
Question # 9

Which two statements about SDN and NFV are true? (Choose two.)

A.

NFV separates network control and forwarding functions and provides a centralized view of the network.

B.

SDN decouples network services from hardware appliances so they can run in software.

C.

SDN separates network control and forwarding functions and provides a centralized view of the network.

D.

NFV decouples network services from hardware appliances so they can run in software.

Full Access