What are two TCP flag settings that are considered suspicious?
What are two TCP flag settings that are considered suspicious? (Choose two.)
Which form of Web filtering is being used?
The Junos OS blocks an HTTP request due to a Websense server response. Which form of
Web filtering is being used?
Which two statements are true regarding redundancy groups?
Which two statements are true regarding redundancy groups? (Choose two.)
What are two components of the Junos software architecture?
What are two components of the Junos software architecture? (Choose two.)
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?
Which IDP policy action closes the connection and sends an RST packet to both the client
and the server?
Which statement describes the UTM licensing model?
Which statement describes the UTM licensing model?
Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?
You have configured a UTM profile called Block-Spam, which has the appropriate antispam
configuration to block undesired spam e-mails. Which configuration would protect an SMTP
server in the dmz zone from spam originating in the untrust zone?
which protocol(s) are allowed to communicate with the device on ge-0/0/0.0?
Which two statements about static NAT are true?
Which two statements about static NAT are true? (Choose two.)
Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series device…?
Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series
device has been properly configured with antispam inspection enabled for the appropriate
security policy? (Choose three.)