Which two statements are true about the output shown in the exhibit on the branch SRX device?
Click the Exhibit button.
— Exhibit —
user@host> show security utm web-filtering statistics
UTM web-filtering statistics:
Total requests: 298171
white list hit: 0
Black list hit: 0
Queries to server: 17641
Server reply permit: 14103
Server reply block: 3538
Custom category permit: 0
Custom category block: 0
Cache hit permit: 171020
Cache hit block: 109510
Web-filtering sessions in total: 4000
Web-filtering sessions in usE. 0
Fallback: log-and-permit block
Default 0 0
Timeout 0 0
Connectivity 0 0
Too-many-requests 758 0
— Exhibit —
Which two statements are true about the output shown in the exhibit on the branch SRX
device? (Choose two.)
How will the WX platform treat a flow that has been active before the tunnel was established?
How will the WX platform treat a flow that has been active before the tunnel was established?
(Note: assume that the application is properly configured for TCP Acceleration.)
How can you remove the Privileged Exec password from the router?
How can you remove the Privileged Exec password from the router?
Which two are required for initial configuration?
Which two are required for initial configuration? (Choose two.)
which two PPP authentication methods are supported by the ERX Edge Router?
In a PPP over ATM environment, which two PPP authentication methods are supported by the
ERX Edge Router? (Choose two).
What is the network address for the 10.13.147.100/19 host?
What is the network address for the 10.13.147.100/19 host?
Which statement is true based on the scenario above?
The network administrator wants to configure QoS for all traffic from 10.12.0.0/16 to 10.24.0.0/16,
but not from the subnet 10.12.128.0/16. Which statement is true based on the scenario above?
which command string controls the number of sessions supported?
When configuring the router to support dynamic PPPoE interfaces, which command string controls
the number of sessions supported?
Which three security features are offered on the WX platforms?
Which three security features are offered on the WX platforms? (Choose three.)
which two statements are true about traffic from host_a to host_b (Choose two.)?
Click the Exhibit button.
— Exhibit —
[edit security policies from-zone HR to-zone trust]
user@host# show
policy two {
match {
source-address subnet_a;
destination-address host_b;
application [ junos-telnet junos-ping ];
}
then {
reject;
}
}
policy one {
match {
source-address host_a;
destination-address subnet_b;
application any;
}
then {
permit;
}
}
— Exhibit —
host_a is in subnet_a and host_b is in subnet_b.
Given the configuration shown in the exhibit, which two statements are true about traffic from
host_a to host_b (Choose two.)?