How do you achieve this?
In a group VPN topology, you have three members A, B. and C. You want A lo communicate with B using a different encryption key from the one it uses to communicate with C.
How do you achieve this?
Which two characteristics of the attack must you understand to configure the attack object?
You have been asked to configure a signature to block an attack released by a security vulnerability reporting agency. Which two characteristics of the attack must you understand to configure the attack object? (Choose two)
What describes the NULL scan and how would you effectively mitigate it?
What describes the NULL scan and how would you effectively mitigate it?
What are two valid chassis cluster implementations?
What are two valid chassis cluster implementations? (Choose two.)
Which two statements represent valid considerations for this deployment scenario?
You want to implement a chassis cluster using SRX650s in your network. Your manager has informed you that the nodes participating in the chassis cluster will reside in remote locations.
Which two statements represent valid considerations for this deployment scenario? (Choose two.)
Which static route configuration will accomplish this?
You want to allow users from routing-instance Juniper1 to route to the destination 2.2.2.2, reached through routing-instance Juniper2 without sharing all the routes between the two instances.
Which static route configuration will accomplish this?
Which policy will this packet match?
The SRX Series device is configured for source NAT. The source IP address will be translated to 1.1.1.1. A packet with a source address of 21.21.21.21 and destination address of 31.1.1.1 arrives at the SRX Series device.
Which policy will this packet match?
What is required to capture the transit application traffic on the egress interface?
You are notified that a particular application passing through a SRX3600 is not working properly. A request has been made to provide a packet capture of the application traffic as it egresses the SRX device.
What is required to capture the transit application traffic on the egress interface?
What are two implementations of NAT?
What are two implementations of NAT? (Choose two.)
Which statement is true?
Given the session shown below:
user@srx> show security flow session
Session ID: 3729, Policy name: nat-example-security-policy/6, Timeout: 2 In: 10.1.0.13/52939 –> 207.17.137.229/80;tcp, If: ge-0/0/5.0 Out: 207.17.137.229/80 –> 172.19.101.42/2132;tcp, If:
ge-0/0/0
Which statement is true?