What are two elements of a custom IDP/IPS attack object? (Choose two.)
What are two elements of a custom IDP/IPS attack object? (Choose two.) A. the attack signature B. the severity of the attack C. the destination zone D. the exempt rulebase
Which two features would accomplish this task? (Choose two.)
You are asked to improve resiliency for individual redundancy groups in an SRX4600 chassis cluster. Which two features would accomplish this task? (Choose two.) A. IP address monitoring B. control link recovery C. interface monitoring D. dual fabric links
When considering managed sessions, which configuration parameter determines how full the session table must be
When considering managed sessions, which configuration parameter determines how full the session table must be to implement the early age-out function? A. session service timeout B. high waremark C. low watermark D. policy rematch
What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)
What are two types of attack objects used by IPS on SRX Series devices? (Choose two.) A. protocol anomaly-based attacks B. spam-based attacks C. signature-based attacks D. DDoS-based attacks
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
Which statement is true about high availability (HA) chassis clusters for the SRX Series device? A. Cluster nodes require an upgrade to HA compliant Routing Engines. B. Cluster nodes must be connected through a Layer 2 switch. C. There can be active/passive or active/active clusters. D. HA clusters must use NAT to prevent overlapping subnets […]
Which two statements are correct about server-protection SSP proxy? (Choose two.)
Which two statements are correct about server-protection SSP proxy? (Choose two.) A. The server-protection SSL proxy intercepts the server certificate. B. The server-protection SSL proxy is also known as SSL reverse proxy. C. The server-protection SSL proxy forwards the server certificate after modification. D. The server-protection SSL proxy acts as the server from the client’s […]
Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)
Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.) A. AppQoE B. APBR C. Secure Application Manager D. AppQoS E. AppFormix Reference: https://www.juniper.net/documentation/en_US/junos/information-products/pathway-pages/security/security-application-identification.pdf
Click the Exhibit button. You need to have the JATP solution analyzer .jar, .xls, and .doc files. Referring to the exhibit, which two file types must be selected to accomplish this task? (Choose two.) A. Java B. library C. document D. executable
To complete this task, where should you configure the default gateway for the User-1 device?
Click the Exhibit button. Referring to the exhibit, you want to deploy Sky ATP with Policy Enforcer to block infected hosts at the access layer. To complete this task, where should you configure the default gateway for the User-1 device? A. the irb interface on QFX-2 B. the irb interface on QFX-1 C. the interface […]
What are two examples of RTOs? (Choose two.)
What are two examples of RTOs? (Choose two.) A. IPsec SA entries B. session table entries C. fabric link probes D. control link heartbeats