Which three open standards protocols would be used for …
You want to stretch Layer 2 traffic between two data centers.
Which three open standards protocols would be used for this task? (Choose three.)
What are two features used to enable high availability?
What are two features used to enable high availability? (Choose two.)
Which VPN technique can be used on your remote office SRX Series device?
Your company is bringing a remote office online and will use VPN connectivity for access to resources between offices. The remote SRX Series device has an IP address, which it obtained dynamically from a service provider.
Which VPN technique can be used on your remote office SRX Series device?
What is the attacker doing with these packets?
You notice an unusual increase in activity in your network. You investigate by reviewing logs and analyzing traffic flows. In your analysis, you identify a remote host is sending traffic to your network with random TCP flags set including URG PSH, ACK and FIN.
What is the attacker doing with these packets?
Which solution accomplishes this task?
You need to establish a new point-to-point IPSec VPN to a recently acquired remote site. The remote site is currently using the same network space with many overlapping IP addresses. You have been asked to implement an interim solution until there is time to migrate the remote site to a different network space.
Which solution accomplishes this task?
What can you do to resolve this problem?
You have been asked to troubleshoot a VoIP connectivity problem that occurs every t me the IPSec VPN tunnel drops. The SRX Series device has a default route to the Internet and receives a more specific route for the VoIP server over the IPSec tunnel using OSPF. Every time the tunnel drops, when the tunnel re-establishes, the NOC must manually clear the sessions on the SRX device for these VoIP sessions to work again.
What can you do to resolve this problem?
Where in the configuration is Application Tracking applied?
Bandwidth utilization has significant^ increased recently on the SRX3600 connecting your company to the Internet. You have decided to enable the Application Tracking feature on the device to provide visibility into the volume of the different applications passing through.
Where in the configuration is Application Tracking applied?
Which three reasons might be the cause of this issue?
An IPSec tunnel has just gone down in your network and you have been asked to troubleshoot and resolve the issue. Which three reasons might be the cause of this issue? (Choose three.)
Which parameter would be enabled for this solution?
You have a VoIP application that requires external sessions to be initiated into your environment. The internal host has previously sent a packet to the external VoIP application’s reflexive transport address.
Which parameter would be enabled for this solution?
Which statement is correct?
You have been asked to implement a hub-and-spoke IPSec VPN in a multi-vendor environment where the spoke devices are not always Junos devices.
Which statement is correct?