Which two configuration elements are required for a policy-based VPN?
Which two configuration elements are required for a policy-based VPN? (Choose two.)
Which two statements are true for both express antivirus and full file-based antivirus?
Which two statements are true for both express antivirus and full file-based antivirus? (Choose two.)
Which statement is true about interfaces, zones, and routing-instance relationships?
Which statement is true about interfaces, zones, and routing-instance relationships?
What do you use to group interfaces with similar security requirements?
What do you use to group interfaces with similar security requirements?
Which statement is true when express AV detects a virus in a TCP session?
Which statement is true when express AV detects a virus in a TCP session?
Which statement describes the behavior of a security policy?
Which statement describes the behavior of a security policy?
What are two rulebase types within an IPS policy on an SRX Series device?
What are two rulebase types within an IPS policy on an SRX Series device? (Choose two.)
Which type of source NAT is configured in the exhibit?
Which two statements are true about the output shown in the exhibit on the branch SRX device?
Click the Exhibit button.
— Exhibit —
user@host> show security utm web-filtering statistics
UTM web-filtering statistics:
Total requests: 298171
white list hit: 0
Black list hit: 0
Queries to server: 17641
Server reply permit: 14103
Server reply block: 3538
Custom category permit: 0
Custom category block: 0
Cache hit permit: 171020
Cache hit block: 109510
Web-filtering sessions in total: 4000
Web-filtering sessions in usE. 0
Fallback: log-and-permit block
Default 0 0
Timeout 0 0
Connectivity 0 0
Too-many-requests 758 0
— Exhibit —
Which two statements are true about the output shown in the exhibit on the branch SRX device? (Choose
two.)
which two statements are true about traffic from host_a to host_b (Choose two.)?
Click the Exhibit button.
— Exhibit —
[edit security policies from-zone HR to-zone trust]
user@host# show
policy two {
match {
source-address subnet_a;
destination-address host_b;
application [ junos-telnet junos-ping ];
}
then {
reject;
}
}
policy one {
match {
source-address host_a;
destination-address subnet_b;
application any;
}
then {
permit;
}
}
— Exhibit —
host_a is in subnet_a and host_b is in subnet_b.
Given the configuration shown in the exhibit, which two statements are true about traffic from host_a to
host_b (Choose two.)?