Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged throug
Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged
through an IPsec VPN? (Choose three.)
Which algorithm should you use?
You are asked to implement the hashing algorithm that uses the most bits in the calculation on your Junos
security device.
Which algorithm should you use?
Which IKE Phase 1 mode must you use?
You are asked to establish an IPsec VPN to a remote device whose IP address is dynamically assigned by the
ISP.
Which IKE Phase 1 mode must you use?
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS?
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS? (Choose three.)
which two values?
A security association is uniquely identified by which two values? (Choose two.)
Which two parameters must be identical to the remote device’s parameters when designing the local IKE pr
You are asked to establish an IPsec VPN between two sites. The remote device has been preconfigured.
Which two parameters must be identical to the remote device’s parameters when designing the local IKE
proposal? (Choose two.)
Which two statements are correct about IPsec security associations?
Which two statements are correct about IPsec security associations? (Choose two.)
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 second
You are deploying a branch site which connects to two hub locations over an IPsec VPN. The branch SRX Series
device should send all traffic to the first hub unless it is unreachable and should then direct traffic to the
second hub. You must use static routes to send traffic towards the hub site.
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60
seconds? (Choose two.)
Which two statements are correct regarding reth interfaces?
Which two statements are correct regarding reth interfaces? (Choose two.)
Which two statements are correct about establishing a chassis cluster with IPv6?
Which two statements are correct about establishing a chassis cluster with IPv6? (Choose two.)