Question 31
What is an advantage of the Junos Telemetry Interface(JTI) over SNMP?
Question 32
Which protocol used to communicate LSP and status information between NorthStar controller and label edge routers?
Question 33
You are using the Juniper connected security solution to protect your network from malware. However, you noticed that malware files over 10 MB are not being analyzed. You need the capability of analyzing files greater than 10MB.
Which two components would allow you to accomplish this task ? (Choose two)
Which two components would allow you to accomplish this task ? (Choose two)
Question 34
Which method does WANDL use to collect live network information?
Question 35
Which statement is true regarding an OpenFlow controller-based software defined network?

