Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment?
Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment? (Choose two.)
Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged throug
Which three algorithms are used by an SRX Series device to validate the integrity of the data
exchanged through an IPsec VPN? (Choose three.)
Which algorithm should you use?
You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.
Which algorithm should you use?
Which IKE Phase 1 mode must you use?
You are asked to establish an IPsec VPN to a remote device whose IP address is dynamically
assigned by the ISP.
Which IKE Phase 1 mode must you use?
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS?
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS? (Choose
three.)
which two values?
A security association is uniquely identified by which two values? (Choose two.)
Which two parameters must be identical to the remote device’s parameters when designing the local IKE pr
You are asked to establish an IPsec VPN between two sites. The remote device has been
preconfigured.
Which two parameters must be identical to the remote device’s parameters when designing the
local IKE proposal? (Choose two.)
Which two statements are correct about IPsec security associations?
Which two statements are correct about IPsec security associations? (Choose two.)
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 second
You are deploying a branch site which connects to two hub locations over an IPsec VPN. The
branch SRX Series device should send all traffic to the first hub unless it is unreachable and
should then direct traffic to the second hub. You must use static routes to send traffic towards the
hub site.
Which two technologies should you use to fail over from a primary to a secondary tunnel in less
than 60 seconds? (Choose two.)
Which two statements are correct regarding reth interfaces?
Which two statements are correct regarding reth interfaces? (Choose two.)