Which command do you run to confirm this?
You initiated the download of the attack database. The system indicates that it will run asynchronous and returns you to a command prompt in the CLI. You want to know if the download has completed.
Which command do you run to confirm this?
What causes a node in an SRX Series chassis cluster to be in the disabled state?
What causes a node in an SRX Series chassis cluster to be in the disabled state?
What are two primary requirements?
You want to add a dynamic VPN to your SRX650. This dynamic VPN must be able to support five users at the same time.
What are two primary requirements? (Choose two.)
Which feature is used to verify that the VPN tunnel is up even if user traffic is not passing through it?
A site-to-site VPN is configured between the main office and a remote office. An administrator wants to keep track of the VPN tunnel.
Which feature is used to verify that the VPN tunnel is up even if user traffic is not passing through it?
How do you respond?
You want to deploy an SRX Series cluster for a distributed data center between two remote locations. The earner will provide you with dark fiber capable of the following: a 100 km reach. 125ms propagation delay, and a packet loss of 1 out of 10.000.000 packets. You plan to connect the fiber directly to the SRX Series devices without any switches in between, and you plan to configure the SRX Series devices with a straightforward cluster configuration. One of the NOC engineers expresses doubts that this design will work.
How do you respond?
Which attack object will protect your infrastructure from nonstandard packets?
A security analyst at your company wants to make sure packets coming from the Internet accessing your public Web servers are protected from HTTP packets that do not meet standards.
Which attack object will protect your infrastructure from nonstandard packets?
Which rib-group configuration will accomplish this?
You want to allow users from routing-instance Juniper1 to route to the destination 2.2.2.2, reached through routing-instance Juniper2 without sharing all the routes between the two instances. You have configured policy-statement move_routes with a route-filter to accept the 2 2.2.2 route. You have created rib-group Group1, and applied it under routing-instance Juniper2.
Which rib-group configuration will accomplish this?
What will help throttle the attack?
An attacker from IP address 1.1.1.2 is filling your SRX Series device’s session table with TCP sessions that have all completed a legitimate three-way handshake.
What will help throttle the attack?
Which two actions should you take to ensure that the SRX Series device renegotiates the VPN faster?
A site-to-site VPN is configured between satellite offices and headquarters using a digital certificate from a neutral party. Once the VPN is up and stable, the certificate issued by the neutral party is revoked. The next-update time is not contained in the CRL.
Which two actions should you take to ensure that the SRX Series device renegotiates the VPN faster? (Choose two.)
how should you upgrade the SRX cluster?
In planning for your core data center’s SRX5800 cluster software upgrade, minimal downtime is requested by your management team.
With a goal to achieve maximum uptime, how should you upgrade the SRX cluster?