Which two methods will accomplish this task?
Two companies, A and B, are connected as separate customers on an SRX5800 residing on two virtual routers
(VR-A and VR-B). These companies have recently been merged and now operate under a common IT security
policy. You have been asked to facilitate communication between these VRs. Which two methods will
accomplish this task? (Choose two.)
Which two steps must you take to modify the application?
Microsoft has altered the way their Web-based Hotmail application works. You want to update your application
firewall policy to correctly identify the altered Hotmail application. Which two steps must you take to modify the
application? (Choose two.)
What are two ways to accomplish this goal?
You are asked to establish a baseline for your company’s network traffic to determine the bandwidth usage per
application. You want to undertake this task on the central SRX device that connects all segments together.
What are two ways to accomplish this goal? (Choose two.)
How would you accomplish this goal?
You want to verify that all application traffic traversing your SRX device uses standard ports. For example, you
need to verify that only DNS traffic runs through port 53, and no other protocols. How would you accomplish this
goal?
Where in the configuration would you create the necessa…
You are asked to apply individual upload and download bandwidth limits to YouTube traffic. Where in the
configuration would you create the necessary bandwidth limits?
which command would you enter in the CLI to produce thi…
Referring to the following output, which command would you enter in the CLI to produce this result?
Ruleset Application Client-to-server Rate(bps) Server-to-client Rate(bps)
http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200
http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200
ftp-App-QoS FTP ftp-C2S 100 ftp-C2S 100
Which three actions will help reduce the amount of proc…
You have just created a few hundred application firewall rules on an SRX device and applied them to the
appropriate firewall polices. However, you are concerned that the SRX device might become overwhelmed with
the increased processing required to process traffic through the application firewall rules.
Which three actions will help reduce the amount of processing required by the application firewall rules?
(Choose three.)
Which two actions will help the SRX device correctly id…
You recently implemented application firewall rules on an SRX device to act upon encrypted traffic. However,
the encrypted traffic is not being correctly identified. Which two actions will help the SRX device correctly
identify the encrypted traffic? (Choose two.)
What are three components used to accomplish this task?
Your company’s network has seen an increase in Facebook-related traffic. You have been asked to restrict the
amount of Facebook-related traffic to less than 100 Mbps regardless of congestion. What are three
components used to accomplish this task? (Choose three.)
which threshold will the bot clients no longer be class…
You are using the AppDoS feature to control against malicious bot client attacks. The bot clients are using file
downloads to attack your server farm. You have configured a context value rate of 10,000 hits in 60 seconds. At
which threshold will the bot clients no longer be classified as malicious?