Which two methods will accomplish this goal?
You are asked to change the configuration of your company’s SRX device so that you can
block nested traffic from certain Web sites, but the main pages of these Web sites must
remain available to users. Which two methods will accomplish this goal? (Choose two.)
which threshold will the bot clients no longer be classified as malicious?
You are using the AppDoS feature to control against malicious bot client attacks. The bot
clients are using file downloads to attack your server farm. You have configured a context
value rate of 10,000 hits in 60 seconds. At which threshold will the bot clients no longer be
classified as malicious?
What are three components used to accomplish this task?
Your company’s network has seen an increase in Facebook-related traffic. You have been
asked to restrict the amount of Facebook-related traffic to less than 100 Mbps regardless of
congestion. What are three components used to accomplish this task? (Choose three.)
Which two actions will help the SRX device correctly identify the encrypted traffic?
You recently implemented application firewall rules on an SRX device to act upon encrypted
traffic. However, the encrypted traffic is not being correctly identified. Which two actions will
help the SRX device correctly identify the encrypted traffic? (Choose two.)
Which three actions will help reduce the amount of processing required by the application firewall rules?
You have just created a few hundred application firewall rules on an SRX device and
applied them to the appropriate firewall polices. However, you are concerned that the SRX
device might become overwhelmed with the increased processing required to process traffic
through the application firewall rules. Which three actions will help reduce the amount of
processing required by the application firewall rules? (Choose three.)
which command would you enter in the CLI to produce this result?
Where in the configuration would you create the necessary bandwidth limits?
You are asked to apply individual upload and download bandwidth limits to YouTube traffic.
Where in the configuration would you create the necessary bandwidth limits?
How would you accomplish this goal?
You want to verify that all application traffic traversing your SRX device uses standard ports.
For example, you need to verify that only DNS traffic runs through port 53, and no other
protocols. How would you accomplish this goal?
What are two ways to accomplish this goal?
You are asked to establish a baseline for your company’s network traffic to determine the
bandwidth usage per application. You want to undertake this task on the central SRX device
that connects all segments together. What are two ways to accomplish this goal? (Choose
two.)
Which two steps must you take to modify the application?
Microsoft has altered the way their Web-based Hotmail application works. You want to
update your application firewall policy to correctly identify the altered Hotmail application.
Which two steps must you take to modify the application? (Choose two.)