Juniper Exam Questions

which Junos Screen option should you enable to limit the effects of the attack while allowing legiti

Click the Exhibit button.
A server in the DMZ of your company is under attack. The attacker is opening a large
number of TCP connections to your server which causes resource utilization problems on
the server. All of the connections from the attacker appear to be coming from a single IP
address.
Referring to the exhibit, which Junos Screen option should you enable to limit the effects of
the attack while allowing legitimate traffic?

A.
Apply the Junos Screen option limit-session source-based-ip to the Untrust security zone.

B.
Apply the Junos Screen option limit-session source-based-ip to the DMZ security zone.

C.
Apply the Junos Screen option limit-session destination-based-ip to the Untrust security
zone.

D.
Apply the Junos Screen option limit-session destination-based-ip to the DMZ security
zone.