What can you do to get the traffic to flow to the transparent proxy DMZ
Your company has installed a new transparent proxy server that it wants all employee traffic to traverse before taking the default route to the Internet. The proxy server is within two DMZ zones from the SRX Series device, which means your SRX device must now have two default routes:
one to the proxy DMZ and one to the Internet from the proxy DMZ.
What can you do to get the traffic to flow to the transparent proxy DMZ, and then from the proxy DMZ to the Internet, regardless of the destination or port?
how should you secure the borders from these attacks while allowing legitimate traffic to pass through?
Click the Exhibit button.
In the process of securing your network from network reconnaissance, you notice that a large number of random packets are destined for unused segments on your network.
Referring to the exhibit, how should you secure the borders from these attacks while allowing legitimate traffic to pass through?
How can the configuration be changed to accommodate this requirement/?
Click the Exhibit button
The exhibit shows an IPSec tunnel configuration In an effort to increase the security of the tunnel, you must configure the tunnel to negotiate a new tunnel key during IKE phase 2.
How can the configuration be changed to accommodate this requirement/?
Which statement is correct about the output in the exhibit regarding the data channel?
Click the Exhibit button.
The client is downloading a file from the FTP server. The FTP control channel is established using a security policy named t rust-to-untrust.
Which statement is correct about the output in the exhibit regarding the data channel?
What must you do for the automatic update to function properly?
Click the Exhibit button
Senior management reports that your company’s network is being attacked by hackers exploiting a recently announced vulnerability. The attack is not being detected by the DP on your SRX Series device. You suspect that your attack database is out of date. You check the version of the attack database and discover it is several weeks old. You configured your device to download updates automatically as shown in the exhibit.
What must you do for the automatic update to function properly?
Which configuration will create the required routing tables?
Click the Exhibit button
In the exhibit, Customer A and Customer B connect to the same SRX Series device. ISP1 and ISP2 are also directly connected to the SRX device. Customer A’s traffic must use ISP1, and Customer B’s traffic must use ISP2.
Which configuration will create the required routing tables?
what does the configured screen do?
Click the Exhibit button.
In the exhibit, what does the configured screen do?
Which interface would be used to forward traffic to host 1.1.7.5?
Exhibit
Review the exhibit. Which interface would be used to forward traffic to host 1.1.7.5?
what will be the source address of the packet arriving at host D?
Exhibit
IfAinitiates a Web browsing session with D, and the E1 interface of the 208 is in NAT mode, what will be the source address of the packet arriving at host D? (Assume a single VR implementation)
What would be the best routing command to allow host Certkiller A to communicate with host Certkiller B?
Exhibit
Review the exhibit. What would be the best routing command to allow host Certkiller A to communicate with host Certkiller B? (Assume a route from the 208 to Host Certkiller A’s subnet already exists.)