Click the Exhibit button.
What will be the result of deploying the Heat template shown in the exhibit?
Neither VM will be deployed.
Only vm_2 will be deployed and vm_1 will be overwritten.
Both vm_1 and vm_2 will be deployed.
Only vm_1 will be deployed and vm_2 will fail.
Which statements correct about Contrail security?
Contrail security is used to control access into Junos devices.
Contrail security is used to apply security features and segment traffic flows.
Contrail security is used to analyze network performance and learn traffic patterns.
Contrail security is used to control management access to VNFs.
A vRouter includes which two containers? (Choose two.)
nodemgr
dns
api
agent
What are three ways to deploy an MX Series device as an SDN gateway? (Choose three.)
Configure it as an L4 gateway.
Configure it as an application gateway.
Configure it as an SDN-to-SDN gateway.
Configure it as an L3 gateway.
Configure it as an L2 gateway.
What is the proper order for creating a virtual network?
Configure the IPAM, virtual network, DNS, and then the virtual machine.
Configure the DNS, IPAM, virtual network, and then the virtual machine.
Configure the virtual network, DNS, IPAM, and then the virtual machine.
Configure the IPAM, DNS, virtual network, and then the virtual machine.
Section: (none)
Explanation
Which two statements about SDN and NFV are true? (Choose two.)
NFV separates network control and forwarding functions and provides a centralized view of the network.
SDN decouples network services from hardware appliances so they can run in software.
SDN separates network control and forwarding functions and provides a centralized view of the network.
NFV decouples network services from hardware appliances so they can run in software.