In which order are the stages of an attack?
After implementing a chassis cluster for active/active clustering, you have identified a congestion issue with traffic traversing the data link between the two nodes.
Which solution should you implement?
A security alert has been issued for an application running on your network that exploits a buffer overflow to compromise the application. The security alert specifies that client-to-server communication will contain the string "*~hack-man?" or the string "back*?/hat".
Which type of IPS custom signature is required to block the traffic?
You want to implement a VPN on your SRX device that will use certificates to authenticate with the peer gateway. You plan to allow certificates from any certificate authority.
Which two configuration commands are required? (Choose two.)
You have a VoIP application that requires external sessions to be initiated into your environment. The internal host has not sent an initial packet to the external host’s reflexive transport address.
Which NAT parameter will accomplish this task?
Your company wants to deploy IPv6. The deployment on core routers has been completed. You now must enable your firewalls with the new protocol, but you must configure the SRX Series device so that it does not yet examine IPv6 packets.
How do you accomplish this?
Your company has VPNs that connect to other companies. The company wants to use certificates with a recognized third-patty certificate authority.
Which two steps are required to use certificates with a certificate authority? (Choose two)
For RG 1, Node 0 has priority 100; Node 1 has priority 200. Preempt has been configured. Node 0 has been rebooted; therefore, Node 1 is primary for RG 1.
What happens when Node 0 comes back up?
You have been asked to design and deploy a VPN-based backup network for your enterprise. Your network is currently configured across a single OSPF Area 0. All the VPN termination points in your network will be Juniper Networks SRX Series devices.
How must you configure your devices so that static routing can be avoided?
You must protect your network against Layer 4 scans.
Which two actions help you achieve this objective? (Choose two)