Which two actions will help the SRX device correctly identify the encrypted traffic?
You recently implemented application firewall rules on an SRX device to act upon encrypted
traffic. However, the encrypted traffic is not being correctly identified.
Which two actions will help the SRX device correctly identify the encrypted traffic? (Choose two.)
Which three actions will help reduce the amount of processing required by the application firewall rules?
You have just created a few hundred application firewall rules on an SRX device and applied them
to the appropriate firewall polices. However, you are concerned that the SRX device might
become overwhelmed with the increased processing required to process traffic through the
application firewall rules.
Which three actions will help reduce the amount of processing required by the application firewall
rules? (Choose three.)
which command would you enter in the CLI to produce this result?
Referring to the following output, which command would you enter in the CLI to produce this result?
Pic2/1
Ruleset Application Client-to-server Rate(bps) Server-to-client Rate(bps)
http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200
http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200
ftp-App-QoS FTP ftp-C2S 100 ftp-C2S 100
Where in the configuration would you create the necessary bandwidth limits?
You are asked to apply individual upload and download bandwidth limits to YouTube traffic.
Where in the configuration would you create the necessary bandwidth limits?
How would you accomplish this goal?
You want to verify that all application traffic traversing your SRX device uses standard ports. For
example, you need to verify that only DNS traffic runs through port 53, and no other protocols.
How would you accomplish this goal?
What are two ways to accomplish this goal?
You are asked to establish a baseline for your company’s network traffic to determine the
bandwidth usage per application. You want to undertake this task on the central SRX device that
connects all segments together. What are two ways to accomplish this goal? (Choose two.)
Which two steps must you take to modify the application?
Microsoft has altered the way their Web-based Hotmail application works. You want to update
your application firewall policy to correctly identify the altered Hotmail application.
Which two steps must you take to modify the application? (Choose two.)
Which two methods will accomplish this task?
Two companies, A and B, are connected as separate customers on an SRX5800 residing on two
virtual routers (VR-A and VR-B). These companies have recently been merged and now operate
under a common IT security policy. You have been asked to facilitate communication between
these VRs. Which two methods will accomplish this task? (Choose two.)
How would you accomplish this task?
You have been asked to configure traffic to flow between two virtual routers (VRs) residing on two
unique logical systems (LSYSs) on the same SRX5800.
How would you accomplish this task?
Which three features are required to accomplish this goal?
You are responding to a proposal request from an enterprise with multiple branch offices. All
branch offices connect to a single SRX device at a centralized location. The request requires each
office to be segregated on the central SRX device with separate IP networks and security
considerations. No single office should be able to starve the CPU from other branch offices on the
central SRX device due to the number of flow sessions. However, connectivity between offices
must be maintained. Which three features are required to accomplish this goal? (Choose three.)