Which three design options must you consider to develop an SDN application that meets these specifications?

You must develop an SDN application that meets these specifications. The solution must
manage devices through a centralized controller to configure access control lists. The
solution will monitor traffic at a packet level to determine which packets are coming from
known rogue applications and/or devices. Identified traffic will be used as the basis to create
new ACLs to be deployed back onto the network devices. The identification and
provisioning steps should take no more than 100 milliseconds. Which three design options
must you consider to develop an SDN application that meets these specifications? (Choose
three.)

You must develop an SDN application that meets these specifications. The solution must
manage devices through a centralized controller to configure access control lists. The
solution will monitor traffic at a packet level to determine which packets are coming from
known rogue applications and/or devices. Identified traffic will be used as the basis to create
new ACLs to be deployed back onto the network devices. The identification and
provisioning steps should take no more than 100 milliseconds. Which three design options
must you consider to develop an SDN application that meets these specifications? (Choose
three.)

A.
use of security and TLS

B.
hardware platforms involved

C.
choice of deployment model

D.
choice of transport protocol

E.
choice of service set

F.
choice of programming and scripting language



Leave a Reply 0

Your email address will not be published. Required fields are marked *