Devices in your data center have become unwilling participants of botnet attacks. In this scenario, which security technology should you use to stop this behavior?
A. Policy Enhancer
B. Sky ATP GeoIP threat protection
C. Sky ATP CandC threat protection
D. IPsec
Exhibit:
Which type of SDN is shown in the exhibit?
A. API-based SDN
B. OpenFlow-based SDN
C. SDN as an overlay
D. SDN as an underlay
Which CSO component enables ISPs to set up and manage the virtual network and customers?
A. Service and Infrastructure Monitor
B. Designer Tools
C. Administration Portal
D. Customer Portal
What are two goals of cloud security automation? (Choose two)
A. to centrally manage security policies
B. to transition all security functions to cloud platforms
C. to automate responses to detected security threats
D. to implement all security functions in hardware
Which OpenStack service manage image storage?
A. Glance
B. Swift
C. Nova
D. Heat
Which type of tunnels are provisioned by the NorthStar controller?
A. IPsec VPNs
B. VPLs
C. MPLS LSPs
D. GRE over UDP
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
A. JTI provides real-time telemetry.
B. JTI does not need a collector to store data
C. JTI requires no configuration
D. JTI can stream in multiple data models
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Kubernetes
B. Ubuntu
C. VirtualBox
D. vSphere
E. Openstack
What are two characteristics of cloud computing? (Choose two.)
A. Services are provisioned using automation.
B. Services are provisioned by the customer.
In which two scenarios is Contrail used? (Choose two.)
A. private cloud networking
B. network hardware lifecycle management
C. Network Functions Virtualization
D. policy-based routing