How do you provide this access?
A medium-sized enterprise has some devices that are 802.1X capable and some that are not.
Any device that fails authentication must be provided limited access through a VLAN called NONAUTH.
How do you provide this access?
which authentication sequence occurs?
When 802.1X, MAC-RADIUS, and Captive Portal are enabled on an interface, which authentication sequence occurs?
which two BGP attributes would you modify to affect outbound traffic?
If your WAN-edge router is multihomed to different ISPs, which two BGP attributes would you modify to affect outbound traffic? (Choose two.)
which order are the stages of an attack?
In which order are the stages of an attack?
Which solution should you implement?
After implementing a chassis cluster for active/active clustering, you have identified a congestion issue with traffic traversing the data link between the two nodes.
Which solution should you implement?
Which type of IPS custom signature is required to block the traffic?
A security alert has been issued for an application running on your network that exploits a buffer overflow to compromise the application. The security alert specifies that client-to-server communication will contain the string "*~hack-man?" or the string "back*?/hat".
Which type of IPS custom signature is required to block the traffic?
Which two configuration commands are required?
You want to implement a VPN on your SRX device that will use certificates to authenticate with the peer gateway. You plan to allow certificates from any certificate authority.
Which two configuration commands are required? (Choose two.)
Which NAT parameter will accomplish this task?
You have a VoIP application that requires external sessions to be initiated into your environment. The internal host has not sent an initial packet to the external host’s reflexive transport address.
Which NAT parameter will accomplish this task?
How do you accomplish this?
Your company wants to deploy IPv6. The deployment on core routers has been completed. You now must enable your firewalls with the new protocol, but you must configure the SRX Series device so that it does not yet examine IPv6 packets.
How do you accomplish this?
Which two steps are required to use certificates with a certificate authority?
Your company has VPNs that connect to other companies. The company wants to use certificates with a recognized third-patty certificate authority.
Which two steps are required to use certificates with a certificate authority? (Choose two)