Question 36
Which statement is true about VNFs?
Question 37
You are deploying a vMX device in your network
Which two virtualized components are required in this scenario?
Which two virtualized components are required in this scenario?
Question 38
What are two protocols used by NorthStar Controller to discover the network topology?(Choose two)
Question 39
Which two features does the Junos Telemetry interface (JTI) support? (Choose two).
Question 40
You want to secure sensitive data and detect malware in your network.
Which component would be used to satisfy this requirement?
Which component would be used to satisfy this requirement?