What happens?
You have deployed enhanced Web filtering on an SRX Series device. A user requests a URL that
is not in the URL filtering cache.
What happens?
Which two URL patterns are valid?
You are configuring a blacklist for Web filtering on a branch SRX Series device.
Which two URL patterns are valid? (Choose two.)
Which two criteria does the enhanced Web filtering solution use to make decisions?
Which two criteria does the enhanced Web filtering solution use to make decisions? (Choose two.)
Which configuration step will accomplish this task?
— Exhibit –-
[edit interfaces]
ge-0/0/1 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
[edit vlans]
vlan-trust {
vlan-id 3;
l3-interface vlan.0;
}
— Exhibit –-
Refer to the Exhibit.
Referring to the exhibit, you need to allow ping traffic into interface ge-0/0/1.
Which configuration step will accomplish this task?
which two services are allowed on the ge-0/0/2.0 interface?
Which additional configuration step is required?
— Exhibit –-
[edit security policies from-zone untrust to-zone junos-host]
user@host# show
policy allow-management {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
[edit security zones security-zone untrust]
user@host# show
host-inbound-traffic {
protocols {
ospf;
}
}
interfaces {
ge-0/0/0.0;
}
— Exhibit –-
Refer to the Exhibit.
Referring to the exhibit, you want to be able to manage your SRX Series device from the Internet
using SSH. You have created a security policy to allow the traffic to flow into the SRX device.
Which additional configuration step is required?
What is allowing hosts to access the Internet?
— Exhibit –-
security {
policies {
from-zone TRUST to-zone UNTRUST {
policy hosts-allow {
match {
source-address hosts;
destination-address any;
application any;
}
then {
permit;
}
scheduler-name block-hosts;
}
policy allow {
match {
source-address any;
destination-address any;
application junos-http;
}
then {
permit;
}
}
policy deny {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
}
}
schedulers {
scheduler block-hosts {
daily {
start-time 10:00:00 stop-time 18:00:00;
}
}
}
— Exhibit –-
Refer to the Exhibit.
Referring to the exhibit, you have configured a scheduler to allow hosts access to the Internet
during specific times. You notice that hosts are still accessing the Internet during times outside of
the scheduler’s parameters.
What is allowing hosts to access the Internet?
The policy allow is allowing hosts access during unscheduled hours.
What is blocking hosts from accessing the Internet?
— Exhibit –-
security {
policies {
from-zone TRUST to-zone UNTRUST {
policy allow-all {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
policy allow-hosts {
match {
source-address hosts;
destination-address any;
application junos-http;
}
then {
permit;
}
scheduler-name block-hosts;
}
policy deny {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
}
}
schedulers {
scheduler block-hosts {
daily {
start-time 10:00:00 stop-time 18:00:00;
}
}
}
— Exhibit –-
Refer to the Exhibit.
Referring to the exhibit, you have configured a scheduler to allow hosts access to the Internet
during specific times. You notice that hosts are unable to access the Internet.
What is blocking hosts from accessing the Internet?
which policy will allow traffic from Host 1, Host 2, and Host 3 to the Internet?
Which configuration will accomplish this task?
— Exhibit –-
[edit security policies]
user@host# show
from-zone hr to-zone internet {
policy internet-access {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
policy clean-up {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
— Exhibit –-
Refer to the Exhibit.
You want to permit access to the Internet from the hr zone during a specified time.
Which configuration will accomplish this task?