Which two components are part of the AppFormix architecture? (Choose two.)
Answer : AD
You need to find a product that will allow for the deployment of security devices to a new tenant edge network in less than one second.
Which product accomplishes this task?
Answer : B
What are two characteristics of Policy Enforcer? (Choose two.)
Answer : BC
Devices in your data center have become unwilling participants of botnet attacks.
In this scenario, which security technology should you use to stop this behavior?
Answer : A
AppFormix alarm notifications are sent to an HTTP server using which format?
Answer : C
Which Juniper product provides insight into the underlay and overlay network at the same time?
Answer : B
Which two statements are true about virtualized platforms? (Choose two.)
Answer : CD
What are two protocols used by the NorthStar Controller to discover the network topology? (Choose two.)
Answer : AD
Which statement is correct when deploying services inside containers?
Answer : A
Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)
Answer : AD
You are using service chains.
In this scenario, which component launches the NFV VM?
Answer : D
You are required to set up zero-day malware detection for your private cloud without sending files off site for analysis.
What will accomplish this task?
Answer : A
Which two benefits does the Junos Telemetry Interface (JTI) provide in an AppFormix architecture? (Choose two.)
Answer : AD
You are deploying a vMX device in your network.
Which two virtualized components are required in this scenario? (Choose two.)
Answer : CD