Question 16

What is an advantage of the Junos Telemetry Interface(JTI) over SNMP?
  • Question 17

    What are two protocols used by NorthStar Controller to discover the network topology?(Choose two) **************
  • Question 18

    Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization?
  • Question 19

    Juniper Networks supports which two alternatives to layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two)
  • Question 20

    Devices in your data center have become unwilling participants of botnet attacks.
    In this scenario, which security technology should you use to stop this behavior?