<< Prev Question Next Question >>

Question 52/56

Carrier-neutral facilities offer connectivity options to cloud providers through which of the following?
(Choose two)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: Which of the following are components of NFV orchestration? ...
Question 2: The primary benefit of MACSEC is:...
Question 3: NSO in the context of virtualized architecture stands for:...
Question 4: EVPN over SR/MPLS provides advantages over traditional MPLS ...
Question 5: BGP multi-path is used in ECMP to enable __________ routing ...
Question 6: Which cloud service model would best suit an organization lo...
Question 7: Which of the following techniques is used for DoS mitigation...
Question 8: DNS security is essential for preventing:...
Question 9: Zero-day exploits are:
Question 10: The primary function of DNS security is to:...
Question 11: FaaS is an ideal cloud service model for:...
Question 12: A Virtual Network Function (VNF) is used to:...
Question 13: gNMI/gRPC are used in network management for:...
Question 14: Which of the following are connectivity options to cloud pro...
Question 15: TLS and mTLS are protocols used for:...
Question 16: Streaming telemetry with gRPC and gNMI is used for:...
Question 17: Yang models are utilized in NFV for what purpose?...
Question 18: A virtual private cloud (VPC) is implemented to provide ____...
Question 19: A zero-day exploit refers to:
Question 20: REST APIs are used in NFV for:
Question 21: VNF workload optimization often involves:...
Question 22: What is a carrier-neutral facility primarily used for?...
Question 23: To secure API communication, it is essential to implement:...
Question 24: Which of the following are true about IPsec VPNs? (Choose tw...
Question 25: BGP flowspec is primarily used for:...
Question 26: In the context of high availability, EVLAG is implemented to...
Question 27: The primary purpose of container orchestration tools like Ku...
Question 28: Which of the following technologies are used for NFV orchest...
Question 29: The implementation of SR-IOV in VNF optimization primarily i...
Question 30: What does NFV stand for?
Question 31: VNF data plane redundancy can be achieved by:...
Question 32: For infrastructure security, which of the following is NOT t...
Question 33: VIM control plane KPIs are important for:...
Question 34: RTBH is effective in mitigating what kind of traffic?...
Question 35: SNMP traps are utilized for which of the following purposes?...
Question 36: NetFlow and IPFIX are protocols used for:...
Question 37: Which of the following is used to restrict access to network...
Question 38: Secure NFVI control and management plane typically involves ...
Question 39: Virus detectors are crucial for:...
Question 40: Implementing multi-homing in a network design provides _____...
Question 41: What is the purpose of VNF data plane redundancy?...
Question 42: Multi-homing is beneficial for:...
Question 43: Software-accelerated virtual switches like DPDK and VPP enha...
Question 44: Connectivity options to other carrier-neutral facilities enh...
Question 45: Which of the following is NOT a purpose of implementing ACLs...
Question 46: SNMP traps and RMON are used for:...
Question 47: What is Virtualized Architecture primarily used for in the c...
Question 48: Virtual Machines and Containers are both used to virtualize ...
Question 49: The main purpose of using IPsec VPN for WAN connectivity is ...
Question 50: Cloud agents are deployed for:
Question 51: Direct connect and MPLS differ in that:...
Question 52: Carrier-neutral facilities offer connectivity options to clo...
Question 53: EVPN Multi-Site (EVPN-MPLS) allows for which of the followin...
Question 54: Direct Connect offers which of the following advantages over...
Question 55: Network segmentation in a service provider cloud environment...
Question 56: gRPC is used in network virtualization for:...