Jump to content

lapulapuisla

Members
  • Content Count

    0
  • Joined

  • Last visited

Everything posted by lapulapuisla

  1. @dotincom is the dump AZ-500 you shared valid, did you pass the exam using this dump? Thanks
  2. Can somebody please share the latest and valid dump for AZ-900 and AZ-104
  3. @dotincom thanks for the share, can you also please share the latest and valid dump for AZ-900 and AZ-104 Thanks
  4. @rawon did you take the exam and can you please share the study materials you use to pass the JN0-211 (JNCIA-DevOps) exam. thanks
  5. Hi @faisalcheru & @OZSA would you be kind enough to please download the latest dump from examtopics for the AZ-104 exam because I can't download all questions. thanks
  6. Can you Please reshare INE Firepower Threat Defense - Part 2 video in mega or google drive
  7. Does anybody have the latest and valid Comptia Server+ (SK0-004) dump
  8. @Taiga_Kagami did you use a dump to pass the exam? Can somebody or @Taiga_Kagami please share a valid and latest dump. Thanks
  9. Can somebody please share a valid and latest dump for AI-900 Microsoft Azure AI Fundamentals
  10. @noahsark can you please share the other questions thats not on the dump. thanks
  11. Can somebody please share a latest & valid dump for juniper JN0-211 JNCIA-Cloud. thanks
  12. What are two characteristics of cloud computing? (Choose two.) Selected Answer Services are provisioned using automation. Services are provisioned by the customer. What are two examples of public cloud providers? (Choose two.) Selected Answer Amazon Web Services Microsoft Azure Which statement defines a public cloud? Selected Answer The cloud infrastructure is provisioned for open use by the general public. What are two characteristics of cloud computing? (Choose two.) Selected Answer measured service resource pooling Which organization is responsible for defining cloud computing? Selected Answer NIST Which type of service would allow you to provision five servers with Windows Server 2016 installed? Selected Answer PaaS What are two characteristics of a data center underlay network? (Choose two.) Selected Answer spine network device redundancy fast failover What are three software suites that contribute to cloud architectures? (Choose three.) Selected Answer Kubernetes OpenStack vSphere A customer wants to deploy a website that can scale as needed. Which type of service should the customer purchase in this scenario? Selected Answer SaaS Which platform is certified to interoperate with VMware NSX? Selected Answer QFX Series Which Juniper product provides insight into the underlay and overlay network at the same time? Selected Answer Contrail Analytics You want to reduce full-mesh internal BGP peering. Which Juniper Networks product will satisfy this requirement? Selected Answer VRR Which Juniper Networks product comprises a complete ETSI NFVI solution? Selected Answer Contrail Cloud Which two Juniper Networks virtualized products are available for use in the public cloud? (Choose two.) Selected Answer vSRX vMX Which statement is true about NFV containers? Selected Answer NFV containers usually provide fewer functions than VM-based VNFs. Which two statements are true about the Juniper Networks implementation of VNFs and NFV? (Choose two.) Selected Answer VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (Choose two.) Selected Answer performance lite Which statement is correct about a VNF? Selected Answer A VNF is a virtual entity that can be launched and managed. Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization? Selected Answer Network Service Activator Your engineering team has identified a problem. Whenever an application becomes popular, the resulting high-traffic load on the VNFs leads to user dissatisfaction. Which Contrail feature would be used to solve this problem? Selected Answer service scaling Which two platforms share the same automation scripts? (Choose two.) Selected Answer vMX Series MX Series What are two technologies that a vMX's control plane uses to communicate with the forwarding plane on the same server? (Choose two.) Selected Answer SR-IOV Virtio Which protocol is used by Contrail Device Manager to configure physical routers? Selected Answer NETCONF Which Contrail component handles packet forwarding for virtual machines? Selected Answer vRouter How does Contrail exchange forwarding information between the Contrail controller and gateway router? Selected Answer BGP In which two scenarios is Contrail used? (Choose two.) Selected Answer private cloud networking Network Functions Virtualization Click the Exhibit button. Which type of SDN is shown in the exhibit? Selected Answer API-based SDN Which two products are required when deploying vSRX as a partner security service in VMware NSX? (Choose two.) Selected Answer Junos Space Security Director VMware NSX Manager Which open source management framework does VMware NSX use to manage VXLANs on a Junos device? Selected Answer OVSDB Which statement is true about the vSRX Series and VMware NSX integration? Selected Answer You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Which two statements are true regarding an SDN controller? (Choose two.) Selected Answer An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Which OpenStack component is responsible for user authentication and authorization? Selected Answer Keystone Which SDN product is used to perform capacity planning on MPLS WAN connections? Selected Answer WANDL Which SDN product is used to manage and optimize MPLS WAN connections? Selected Answer NorthStar Which method does WANDL use to collect live network information? Selected Answer SNMP Which two statements are true regarding SDN WAN implementations? (Choose two.) Selected Answer SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Which statement describes the role of the NorthStar Controller? Selected Answer It is an SDN WAN controller. What are two major components of the NorthStar Controller system? (Choose two.) Selected Answer PCE PCC What are two ways that WANDL constructs topologies? (Choose two.) Selected Answer Imports configuration files. Enters data manually. Which protocol is required for NorthStar to establish paths between PE devices? Selected Answer RSVP-TE Which protocol is used to communicate LSP and status information between the NorthStar Controller and label edge routers? Selected Answer PCEP Which two components are part of the AppFormix architecture? (Choose two.) Selected Answer policy controller data platform Which role does AppFormix perform in an SDN WAN environment? Selected Answer AppFormix sends alert information to an orchestration platform. AppFormix alarm notifications are sent to an HTTP server using which format? Selected Answer JSON From where does AppFormix gather performance metrics in a network? Selected Answer from an agent on a host or system Which two tasks do Contrail analytic nodes perform? (Choose two.) Selected Answer Collects system state information. Raises rule-based alerts. Which two features does the Junos Telemetry Interface (JTI) support? (Choose two.) Selected Answer JTI provides real-time reporting. JTI can stream in multiple message formats. Which protocol is used to transport monitoring data in Juniper's open and extensible data model? Selected Answer UDP Which product in the Juniper Networks portfolio provides accounting and planning information for users by using big data analytics and machine learning? Selected Answer AppFormix What is a supported data model for the Juniper Telemetry Interface? Selected Answer OpenConfig data model Which statement is true about CSO? Selected Answer CSO is ETSI compliant. Which statement is correct when describing a centralized cloud CPE model? Selected Answer Physical CPE devices are not required at the customer's office. Which statement is true about Juniper Networks distributed Cloud CPE deployment model? Selected Answer VNFs are stored on CPEs at the customer branch offices. Which statement is true about the Juniper Networks centralized Cloud CPE deployment model? Selected Answer VNFs are stored as VMs at a centralized data center. Which CSO component enables ISPs to set up and manage the virtual network and customers? Selected Answer Administration Portal Which CSO component enables customers to manage sites and services for their organizations? Selected Answer Customer Portal Which CSO component enables ISPs to design, create, manage, and configure network services that are stored in the network service catalog? Selected Answer Visual Designer Tools Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution? Selected Answer Service and Infrastructure Monitor Which statement is true about Junos Space Security Director? Selected Answer Security Director is a centralized security policy manager. What are two components of the Juniper Networks SDSN solution? (Choose two.) Selected Answer enforcement everywhere on the network centralized management Which two actions would Policy Enforcer take when it determines a user has downloaded a file containing malware? (Choose two.) Selected Answer Put the user in a quarantine VLAN. Block the user from accessing the network. What are two roles of sandboxing in Sky ATP? (Choose two.) Selected Answer to analyze the behavior of potential security threats to store infected files for further analysis What are two goals of Software-Defined Secure Network architectures? (Choose two.) Selected Answer to centrally manage security policies to automate responses to detected security threats Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.) Selected Answer bring your own license pay as you go Which feature set of the vSRX allows you to monitor application usage to identify highrisk applications and analyze traffic patterns? Selected Answer AppTrack
  13. Which secure VPN technology is used for hybrid cloud connectivity over the public Internet? Selected Answer IPsec VPN Correct IPsec VPN Juniper Networks supports which two alternatives to Layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two.) Selected Answer LACP MC-LAG Correct LACP MC-LAG Which protocol establishes VXLAN tunnels? Selected Answer EVPN Correct EVPN Which type of service would allow you to provision five servers with Windows Server 2016 installed? Selected Answer PaaS Correct PaaS What are two characteristics of a data center underlay network? (Choose two.) Selected Answer spine network device redundancy fast failover Correct spine network device redundancy fast failover What are two concepts of a private cloud? (Choose two.) Selected Answer Resources are dedicated to your organization. Resources are accessed through a private connection. Correct Resources are dedicated to your organization. Resources are accessed through a private connection. According to Juniper Networks, what is the recommended external routing protocol for the underlay network? Selected Answer BGP Correct BGP What are three software suites that contribute to cloud architectures? (Choose three.) Selected Answer OpenStack Kubernetes vSphere Correct OpenStack Kubernetes vSphere What information does an underlay network use to route data? Selected Answer IP address Correct IP address A customer wants to deploy a website that can scale as needed. Which type of service should the customer purchase in this scenario? Selected Answer SaaS Correct SaaS Which two statements are true regarding private cloud services? (Choose two.) Selected Answer A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Correct A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Which platform is certified to interoperate with VMware NSX? Selected Answer QFX Series Correct QFX Series What are two reasons to deploy a private cloud? (Choose two.) Selected Answer to protect sensitive data to provide cloud-based services within an organization Correct to protect sensitive data to provide cloud-based services within an organization Which two platforms share the same automation scripts? (Choose two.) Selected Answer MX Series vMX Series Correct MX Series vMX Series What are two components of the ETSI Management and Orchestration (MANO) framework? (Choose two.) Selected Answer virtualized network function manager (VNFM) Network Functions Virtualization (NFV) orchestrator Correct virtualized network function manager (VNFM) Network Functions Virtualization (NFV) orchestrator Your engineering team has identified a problem. Whenever an application becomes popular, the resulting high-traffic load on the VNFs leads to user dissatisfaction. Which Contrail feature would be used to solve this problem? Selected Answer service scaling Correct service scaling Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization? Selected Answer Network Service Activator Correct Network Service Activator Which statement is correct about a VNF? Selected Answer A VNF is a virtual entity that can be launched and managed. Correct A VNF is a virtual entity that can be launched and managed. The vMX Series provides which two benefits? (Choose two.) Selected Answer The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. Correct The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (Choose two.) Selected Answer performance lite Correct performance lite Which two statements are true about the Juniper Networks implementation of VNFs and NFV? (Choose two.) Selected Answer NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. Correct NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. Which statement is true about NFV containers? Selected Answer NFV containers usually provide fewer functions than VM-based VNFs. Correct NFV containers usually provide fewer functions than VM-based VNFs. Which two Juniper Networks virtualized products are available for use in the public cloud? (Choose two.) Selected Answer vSRX vMX Correct vSRX vMX Which OpenStack component is responsible for user authentication and authorization? Selected Answer Keystone Correct Keystone Which two statements are true regarding an SDN controller? (Choose two.) Selected Answer An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Correct An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Which statement is true regarding an OpenFlow controller-based software defined network? Selected Answer The forwarding plane of each device in the network is programmed by the controller. Correct The forwarding plane of each device in the network is programmed by the controller. Which protocol is used to communicate management information between a VMware NSX controller and a Junos Layer 2 gateway? Selected Answer OVSDB Correct OVSDB Which statement is true about the vSRX Series and VMware NSX integration? Selected Answer You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Correct You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers? Selected Answer Network Director Correct Network Director Which two compute hypervisors are supported for Contrail? (Choose two.) Selected Answer ESXi KVM Correct ESXi KVM Which open source management framework does VMware NSX use to manage VXLANs on a Junos device? Selected Answer OVSDB Correct OVSDB Which two products are required when deploying vSRX as a partner security service in VMware NSX? (Choose two.) Selected Answer Junos Space Security Director VMware NSX Manager Correct Junos Space Security Director VMware NSX Manager Which type of SDN is referred to as the original form of SDN? Selected Answer OpenFlow-based SDN Correct OpenFlow-based SDN In which two scenarios is Contrail used? (Choose two.) Selected Answer Network Functions Virtualization private cloud networking Correct Network Functions Virtualization private cloud networking Which protocol is used to communicate LSP and status information between the NorthStar Controller and label edge routers? Selected Answer PCEP Correct PCEP Which protocol is required for NorthStar to establish paths between PE devices? Selected Answer RSVP-TE Correct RSVP-TE What are two ways that WANDL constructs topologies? (Choose two.) Selected Answer Imports configuration files. Enters data manually. Correct Imports configuration files. Enters data manually. What are two major components of the NorthStar Controller system? (Choose two.) Selected Answer PCE PCC Correct PCE PCC Which statement describes the role of the NorthStar Controller? Selected Answer It is an SDN WAN controller. Correct It is an SDN WAN controller. Which two statements are true regarding SDN WAN implementations? (Choose two.) Selected Answer SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Correct SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Which method does WANDL use to collect live network information? Selected Answer SNMP Correct SNMP Which SDN product is used to manage and optimize MPLS WAN connections? Selected Answer NorthStar Correct NorthStar What is a supported data model for the Juniper Telemetry Interface? Selected Answer OpenConfig data model Correct OpenConfig data model Which product in the Juniper Networks portfolio provides accounting and planning information for users by using big data analytics and machine learning? Selected Answer AppFormix Correct AppFormix Which protocol is used to transport monitoring data in Juniper's open and extensible data model? Selected Answer UDP Correct UDP Which two features does the Junos Telemetry Interface (JTI) support? (Choose two.) Selected Answer JTI provides real-time reporting. JTI can stream in multiple message formats. Correct JTI provides real-time reporting. JTI can stream in multiple message formats. Which two tasks do Contrail analytic nodes perform? (Choose two.) Selected Answer Collects system state information. Raises rule-based alerts. Correct Collects system state information. Raises rule-based alerts. From where does AppFormix gather performance metrics in a network? Selected Answer from an agent on a host or system Correct from an agent on a host or system AppFormix alarm notifications are sent to an HTTP server using which format? Selected Answer JSON Correct JSON Which statement is true about CSO? Selected Answer CSO is ETSI compliant. Correct CSO is ETSI compliant. Which statement is correct when describing a centralized cloud CPE model? Selected Answer Physical CPE devices are not required at the customer's office. Correct Physical CPE devices are not required at the customer's office. Which statement is true about Juniper Networks distributed Cloud CPE deployment model?" Selected Answer VNFs are stored as VMs at a centralized data center. Correct VNFs are stored on CPEs at the customer branch offices. Which statement is true about the Juniper Networks centralized Cloud CPE deployment model? Selected Answer VNFs are stored as VMs at a centralized data center. Correct VNFs are stored as VMs at a centralized data center. Which CSO component enables ISPs to set up and manage the virtual network and customers? Selected Answer Administration Portal Correct Administration Portal Which CSO component enables customers to manage sites and services for their organizations? Selected Answer Customer Portal Correct Customer Portal Which CSO component enables ISPs to design, create, manage, and configure network services that are stored in the network service catalog? Selected Answer Visual Designer Tools Correct Visual Designer Tools Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution? Selected Answer Service and Infrastructure Monitor Correct Service and Infrastructure Monitor Which feature set of the vSRX allows you to monitor application usage to identify highrisk applications and analyze traffic patterns? Selected Answer AppTrack Correct AppTrack Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)" Selected Answer pay as you go bring your own license Correct pay as you go bring your own license What are two goals of Software-Defined Secure Network architectures? (Choose two.) Selected Answer to centrally manage security policies to automate responses to detected security threats Correct to centrally manage security policies to automate responses to detected security threats What are two roles of sandboxing in Sky ATP? (Choose two.) Selected Answer to analyze the behavior of potential security threats to store infected files for further analysis Correct to analyze the behavior of potential security threats to store infected files for further analysis Which two actions would Policy Enforcer take when it determines a user has downloaded a file containing malware? (Choose two.) Selected Answer Block the user from accessing the network. Put the user in a quarantine VLAN. Correct Block the user from accessing the network. Put the user in a quarantine VLAN. What are two components of the Juniper Networks SDSN solution? (Choose two.) Selected Answer centralized management enforcement everywhere on the network Correct centralized management enforcement everywhere on the network Which statement is true about Junos Space Security Director? Selected Answer Security Director is a centralized security policy manager. Correct Security Director is a centralized security policy manager. Which Juniper product provides insight into the underlay and overlay network at the same time? Selected Answer Contrail Analytics Correct Contrail Analytics
  14. pls share a valid dump & the voucher test for Juniper Networks Certified Associate, Automation and DevOps (JN0-221)(JNCIA-DevOps). thanks
  15. Wow, you will need the latest i7 processor to even run this. kamui Cisco TE 4,495 67 posts Report post Posted October 5 (edited) Hi folks here my KB sdwan lab1 file and materials.. do mirror quickly will remove link in few days... Hidden Content [Hidden Content] KB VIDEO and WB here Hidden Content [Hidden Content] LAB Hardware Spec requirement to run lab: I least CPU 8 cores & RAM 16 Gb (dedicated) I dont have SD Access Material if so will share it ! Edited Friday at 03:21 AM by kamui
  16. Can please share a latest & valid dump for juniper JN0-211 JNCIA-Cloud. thanks
  17. pls share a valid dump & the voucher test for Juniper Networks Certified Associate, Automation and DevOps (JN0-221)(JNCIA-DevOps). thanks
  18. @Deathdodger thanks for the share, is there a way we can compress that to smaller video file size using HandBrake? [Hidden Content] If somebody can compress it that would be great thanks.
  19. Can you Please reshare INE Firepower Threat Defense - Part 2 in mega or google drive
  20. Can somebody please share the license key for VMware Workstation Pro 16.0 for Windows. Thanks
  21. @CoolCupid can you please share it in mega or google drive. INE Firepower Threat Defense - Part2. thanks
  22. @sallywally link not working, pls reupload in google drive and mega. thanks
  23. @Deibedyn please reupload again in mega or google drive, link is not working. thanks
  24. @Deathdodger link is dead please reupload again in mega or google drive
×
×
  • Create New...