What is a primary difference between NFV and VNF?
A. NFV identifies the host on which the VNF operates.
B. A VNF operates on a bare metal server while NFV operates on a switch
C. A VNF defines the network underlay tunnel methodology while NFV is firewall that inspects traffic in the overlay network.
D. NFV is the framework that describes how a virtual function should operate while VNF is the virtual function itself
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
You are responsible for optimizing a global MPLS WAN. You must determine the optimal MPLS forwarding paths and automate the provisioning of the forwarding paths into the network Which Juniper Networks SDN solution will satisfy the requirements?
A. Network Director
B. NorthStar Controller
C. Policy Enforcer
D. Contrail
正解:B
質問 3:
You are using the NorthStar Controller to manage your WAN. You are required to remove a node from the network for maintenance purposes. You want to compute and provision alternate forwarding paths so that traffic is re-touted around the node being taken offline for maintenance.
Which NorthStar Controller feature would be used in this scenario?
A. node diversity
B. shared risk link groups
C. maintenance mode
D. path diversity
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
Which type of SDN are you using when you automate a Junos device using PyEZ and NETCONF?
A. SDN as an underlay
B. OpenFlow-based SDN
C. SDN as an overlay
D. API-based SDN
正解:D
質問 5:
Which statement is true regarding an OpenFlow controller-based software defined network?
A. The forwarding plane of each device in the network is managed by the device
B. The SDN controller pushes configuration files to each device in the network using RESTful APIs
C. The forwarding plane of each device in the network is programmed by the controller
D. The control plane of each device in the network is instantiated by the controller
正解:C
質問 6:
What are two roles of sandboxing in Sky ATP? (choose two)
A. To test the operation of security rules
B. To store infected files for further analysis
C. To validate the operation of third-party components
D. To analyze the behavior of potential security threats
正解:B,D
質問 7:
What are three software suites that contribute to cloud architectures? (Choose three.)
A. Ubuntu
B. Openstack
C. VirtualBox
D. vSphere
E. Kubernetes
正解:B,D,E
質問 8:
Which two data models are supported for the Junos Telemetry Interface (JTI)? (Choose two.)
A. Amazon Kinesis
B. OpenConfig
C. Native Sensors
D. Azure Application Insights
正解:B,C
質問 9:
You have 100 small branch offices around the world. You must use a single pane of glass to monitor EX Series devices for port status, ports exceeding maximum bandwidth, ports with maximum errors, and ports with maximum packet loss In this scenario, which product would satisfy the requirement?
A. Contrail Networking
B. Contrail SD-WAN
C. Contrail SD-LAN
D. Contrail Cloud
正解:B
中嶋** -
広く浅く問われる内容をポイントで上手くまとめてくれていると思います。JN0-212試験受験者必携の一冊かなって思います!