What are two TCP flag settings that are considered suspicious?
What are two TCP flag settings that are considered suspicious? (Choose two.)
Which form of Web filtering is being used?
The Junos OS blocks an HTTP request due to a Websense server response. Which form of Web filtering is being
used?
Which two statements are true regarding redundancy groups?
Which two statements are true regarding redundancy groups? (Choose two.)
What are two components of the Junos software architecture?
What are two components of the Junos software architecture? (Choose two.)
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?
Which statement describes the UTM licensing model?
Which statement describes the UTM licensing model?
Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to
block undesired spam e-mails. Which configuration would protect an SMTP server in the dmz zone from spam
originating in the untrust zone?
Which two statements about the use of SCREEN options are correct?
Which two statements about the use of SCREEN options are correct? (Choose two.)
which protocol(s) are allowed to communicate with the device on ge-0/0/0.0?
Which two statements about static NAT are true?
Which two statements about static NAT are true? (Choose two.)