What are two network scanning methods?
What are two network scanning methods? (Choose two.)
What are two intrusion protection mechanisms available on SRX Series Services Gateways?
What are two intrusion protection mechanisms available on SRX Series Services
Gateways? (Choose two.)
What is a benefit of using a dynamic VPN?
What is a benefit of using a dynamic VPN?
What is a benefit of using a group VPN?
What is a benefit of using a group VPN?
Which statement is true about Layer 2 zones when implementing transparent mode security?
Which statement is true about Layer 2 zones when implementing transparent mode
security?
What are two AppSecure modules?
What are two AppSecure modules? (Choose two.)
How would you accomplish this goal?
You are working as a security administrator and must configure a solution to protect against
distributed botnet attacks on your company’s central SRX cluster. How would you
accomplish this goal?
Which two methods will accomplish this goal?
You are asked to change the configuration of your company’s SRX device so that you can
block nested traffic from certain Web sites, but the main pages of these Web sites must
remain available to users. Which two methods will accomplish this goal? (Choose two.)
which threshold will the bot clients no longer be classified as malicious?
You are using the AppDoS feature to control against malicious bot client attacks. The bot
clients are using file downloads to attack your server farm. You have configured a context
value rate of 10,000 hits in 60 seconds. At which threshold will the bot clients no longer be
classified as malicious?
What are three components used to accomplish this task?
Your company’s network has seen an increase in Facebook-related traffic. You have been
asked to restrict the amount of Facebook-related traffic to less than 100 Mbps regardless of
congestion. What are three components used to accomplish this task? (Choose three.)