What are the three types of attack objects used in an I…
What are the three types of attack objects used in an IPS engine? (Choose three.)
Which statement is correct regarding the group configur…
You have an existing group VPN established in your internal network using the group-id 1. You have been
asked to configure a second group using the group-id 2. You must ensure that the key server for group 1
participates in group 2 but is not the key server for that group. Which statement is correct regarding the group
configuration on the current key server for group 1?
Which st0 interface configuration is correct for the hu…
You want to implement a hub-and-spoke VPN topology using a single logical interface on the hub. Which st0
interface configuration is correct for the hub device?
Which configuration will accomplish this task?
You are asked to implement a monitoring feature that periodically verifies that the data plane is working across
your IPsec VPN. Which configuration will accomplish this task?
Which authentication method meets the requirement?
Your company is using a dynamic VPN configuration on their SRX device. Your manager asks you to enforce
password expiration policies for all VPN users. Which authentication method meets the requirement?
Which configuration setting would resolve this issue?
You have recently deployed a dynamic VPN. The remote users are complaining that communications with
devices on the same subnet as the SRX device are intermittent and often fail. The tunnel is stable and up, and
communications with remote devices on different subnets work without any issues. Which configuration setting
would resolve this issue?
What are two reasons for this problem?
You have recently deployed a dynamic VPN. Some remote users are complaining that they cannot authenticate
through the SRX device at the corporate network. The SRX device serves as the tunnel endpoint for the
dynamic VPN. What are two reasons for this problem? (Choose two.)
which statement is correct?
You are asked to implement a point-to-multipoint hub-and-spoke topology in a mixed vendor environment. The
hub device is running the Junos OS and the spoke devices are different vendor devices. Regarding this
scenario, which statement is correct?
which statement is correct?
You are asked to implement an IPsec VPN between your main office and a new remote office. The remote
office receives its IKE gateway address from their ISP dynamically.
Regarding this scenario, which statement is correct?
which statement is correct?
You have a group IPsec VPN established with a single key server and five client devices. Regarding this
scenario, which statement is correct?