A. UML
B. HTML5
C. XML
D. PIM
E. JSON
A. They send the information of network polices from applications to the SDN controller.
B. They send the information for packet forwarding from the SDN controller to network devices.
C. They send the information about packet forwarding statistics from network devices to the SDN controller.
D. They send the information of certificate authority from applications to the SDN controller.
A. Policies do not show up in device configuration and are removed when onePK application sessions are disconnected.
B. Polices do not show up in device configuration and persist until the device is reloaded.
C. Policies show up in device configuration and are removed when onePK application sessions are disconnected.
D. Policies show up in device configuration and persist until the device is reloaded.
A. Customer requirements are fully collected before development ensues.
B. Co-location of business-focused individuals and developers for face-to-face conversation is best.
C. Software releases are held until quality gates are met.
D. Changing requirements are welcome, even late in development.
E. Key developers should have a proxy that intercepts rapidly changing requirements.
A. user stories
B. UML diagrams
C. narratives
D. flow charts
E. use cases
A. They can support more routing protocols.
B. Ability to change the logical network topology more easily.
C. Ability to experience higher performance of traffic forwarding.
D. Overlay networks integrate with virtual machines more closely
E. They are more secure.