What are two characteristics of containers used in Contrail? (Choose two.)
AEach container has the configuration for all applications running in that container.
BEach pod can contain only one container.
CEach container has the configuration for all applications running in all containers.
DEach pod can contain several containers.
What is AppFormix used for in Contrail?
Ato deploy an underlay fabric
Bto create VNFs
Cto analyze network performance
Dto secure application traffic
Which role does Contrail serve in SDN?
Aorchestrator
Bcontroller
Cgateway
Dfabric
Which two statements about Kubernetes clusters are correct? (Choose two.)
AThe master coordinates the cluster.
BThe minions are responsible for running the applications.
CThe nodes are responsible for running the applications.
DThe pod controller coordinates the cluster.
Question 6
Network Virtualization
0
Question 7
Cloud Orchestration with OpenStack
Question 8
Cloud Orchestration with OpenStack
Question 9
Network Virtualization
Question 10
Cloud Orchestration with OpenStack
Question 11
Cloud Infrastructure (NFV and SDN)
Question 12
Cloud Infrastructure (NFV and SDN)
Question 13
Network Virtualization
Question 14
Cloud Fundamentals
Question 15
Network Virtualization
Question 16
Cloud Infrastructure (NFV and SDN)
Question 17
Cloud Fundamentals
Question 18
Cloud Fundamentals
Question 19
Cloud Infrastructure (NFV and SDN)
Question 20
Cloud Orchestration with Kubernetes
Question 21
Network Virtualization
Question 22
Cloud Infrastructure (NFV and SDN)
Question 23
Network Virtualization
Question 24
Cloud Infrastructure (NFV and SDN)
Question 25
Network Virtualization
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
You have deployed a Contrail cluster that must support bare-metal servers.
Which protocol is used to communicate between the bare-metal server's virtual tunnel endpoints and the Contrail cluster to establish sessions with the VM servers?
ASRTP
BEVPN/VXLAN
CBGP
DXMPP
To retrieve attributes of a new virtual machine, with which Contrail component does the OpenStack Nova agent communicate to create a virtual network?
ANeutron
BGlance
CAnalytics
DControl
You are asked to change the settings in the AppFormix UI so that compute1's status displays Bad only when CPU utilization is above 70%.
In which workspace of the AppFormix UI would you perform this task?
ASLA Settings
BNotification Settings
CPlugins
DServices Settings
Click the Exhibit button.
The exhibit displays a Contrail analyzer virtual machine's console.
Which two statements are true in this scenario? (Choose two.)
AThe ping traffic is initiated by a virtual machine with an IP address of 20.0.0.3.
BThe ping traffic is initiated by a virtual machine with an IP address of 20.0.0.4.
CThe Contrail analyzer virtual machine's IP address is 10.85.29.11.
DThe Contrail analyzer virtual machine's IP address is 20.0.0.4.
Which two deployment methods does AppFormix support? (Choose two.)
AHyper-V
BVMware
COpenStack
DXen
Which two statements about SDN and NFV are true? (Choose two.)
ANFV separates network control and forwarding functions and provides a centralized view of the network.
BSDN decouples network services from hardware appliances so they can run in software.
CSDN separates network control and forwarding functions and provides a centralized view of the network.
DNFV decouples network services from hardware appliances so they can run in software.
Prior to installing Contrail, which list of settings must be verified on all participating servers?
ADHCP is enabled, hostname resolution, and that SSH is enabled
Btime synchronization, hostname resolution, and that FTP is enabled
Ctime synchronization, hostname resolution, and that SSH is enabled
DDHCP is enabled, hostname resolution, and that FTP is enabled
Which two statements regarding tags, within the Contrail Security framework, are correct? (Choose two.)
ARBAC determines which user accounts can modify or remove attached tags.
BTags are communicated from the control node to vRouters through route updates.
COnly the CSPadmin user account can modify or remove attached tags.
DTags are communicated from the config node to vRouters through route updates.
Which two statements are true about AppFormix Heat maps? (Choose two.)
AAppFormix Heat maps show historical performance at a glance.
BAppFormix Heat maps show a visual chart of the relationship between hosts and VMs.
CAppFormix Heat maps show real-time performance at a glance.
DAppFormix Heat maps show a visual chart of the relationship between control and config nodes.
Which BMS feature ensures that IP address management is consistent between the virtual and physical instances?
Ainventory management
Bimage management
CIPAM management
Dnetwork security management
Which SDN solution allows the control plane to remain on legacy hardware as a stop-gap measure until you are ready to replace the current hardware?
ASDN using NVGRE
BSDN as an overlay
CSDN using an API
Dopen SDN
Which type of query is generated by the curl http://<ip address>:8081/analytics/uves/vrouters command?
ASSL
BREST
CSQL
DXML
Which two statements are true about Generic Device Operations? (Choose two.)
AGeneric Device Operations execute multiple commands on multiple devices.
BGeneric Device Operations are executed using the REST API.
CGeneric Device Operations are executed using Ansible.
DGeneric Device Operations execute a single command on multiple devices.
What are three ways to deploy an MX Series device as an SDN gateway? (Choose three.)
AConfigure it as an L4 gateway.
BConfigure it as an application gateway.
CConfigure it as an SDN-to-SDN gateway.
DConfigure it as an L3 gateway.
EConfigure it as an L2 gateway.
Which two statements describe the Kubernetes network policy? (Choose two.)
AIf a policy is not applied to a pod, then the pod accepts traffic from all sources.
BA policy can define traffic in only one direction.
CA policy can define traffic in both directions.
DIf a policy is not applied to a pod, then the pod blocks traffic from all sources.
Which network type is created in Neutron and mapped to physical networks?
Atransient
Btenant
Cprovider
Dmanagement
Which two fabric management tasks would be completed using Contrail Command? (Choose two.)
AAutomatically deploy an P fabric underlay.
BModify routing protocol preferences.
CChange user permissions on Junos devices.
DDiscover devices in the network.
What is a TAP interface in Contrail?
AA software network interface that operates at OSI Layer 3.
BA hardware network interface that operates at OSI Layer 3.
CA software network interface that operates at OSI Layer 2.
DA hardware network interface that operates at OSI Layer 2.
What are two predefined tags that are used in Contrail Security policies? (Choose two.)
Alabel
Bgroup
Cfamily
Dsite
When creating a firewall rule in Contrail Security, which two types of endpoints are available? (Choose two.)