Which two make up the context of an IPS attack signature?
Which two make up the context of an IPS attack signature? (Choose two.)
Which filter-based forwarding configuration will work for these two customers?
Your company provides a managed network service for its customers. Two of your customers have merged and want to have the same configurations and firewalls. However, they must use their legacy Internet connections. As a result, you need 172.27.0.0/24 to go to ISP A and 172.25.0 0/24 to go to ISP B.
Which filter-based forwarding configuration will work for these two customers?
What is a NULL scan attack and how can you minimize its effects?
What is a NULL scan attack and how can you minimize its effects?
What should you do to meet the requirements?
Your company recently acquired another company. During a site visit and network audit, you recognize that the acquired company’s private network address space overlaps with yours. You will eventually merge the networks, but for the moment, you must make communication between the networks work over the Internet as a first step toward the migration.
What should you do to meet the requirements?
What are two reasons why this happens?
You have implemented a chassis cluster that spans a Layer 2 network between two office campuses. You are using dual fabric links. Some of the RTOs are getting lost.
What are two reasons why this happens? (Choose two.)
Which persistent NAT parameter should you configure?
You have configured persistent NAT in your NAT rule base. You create a security policy in the direction of external to internal.
Which persistent NAT parameter should you configure?
which step?
In the sequence of IPS inspection steps, protocol anomaly detection is performed after which step?
Which SRX VPN feature would you use to cause the route-based VPN with preference 10 to be used?
You have configured your SRX Series device with two route-based VPNs for the same destination network Remote SRX Series device A’s route has a preference of 5 and remote SRX Series device B has a preference of 10. Users complain they cannot reach the networks through the VPN tunnel. You verify the VPN’s status and discover that the IKE Phase 1 and Phase 2 security associations are active, but the remote networks are not reachable.
Which SRX VPN feature would you use to cause the route-based VPN with preference 10 to be used?
Which statement is true?
You have a branch location connected to a virtual-router type of routing-instance. To provide Internet access, one requirement is to provide connectivity to an interface and its direct route, which belongs to the default inet.0 routing-instance.
Which statement is true?
What are two considerations when designing their network?
Your customer is engaged in healthcare service support.
What are two considerations when designing their network? (Choose two.)