What are two possible causes of the higher utilization?
You have set up a chassis cluster in an active-active state. While monitoring the fabric link during a failover scenario, you noticed the utilization is higher than expected.
What are two possible causes of the higher utilization? (Choose two)
Which statement is correct about how the SRX chassis cluster will handle all these packets?
Your company has decided to enable IPv6 in its corporate network. All core network elements are already enabled. You have completed the configuration of the SRX Series cluster. All tests are running well and no issues have been found. The IT department decides to increase the MTU on the access switches and the workstations to 9000, everything else will continue using the standard settings.
Which statement is correct about how the SRX chassis cluster will handle all these packets?
Which three actions can you perform to establish the IPSec SA between the hub and spoke sites?
You are configuring a hub-and-spoke VPN topology between an SRX Series device deployed at the hub site and several devices at spoke sites. You have configured all the settings to establish the tunnel, but the IPSec SA has not yet established all configured proposals and policies match on both sides
Which three actions can you perform to establish the IPSec SA between the hub and spoke sites? (Choose three.)
How long will the binding remain in the SRX Series device’s memory?
You have configured persistent NAT with the default inactivity timeout. All of the sessions of a persistent NAT binding have expired.
How long will the binding remain in the SRX Series device’s memory?
What is causing the problem?
A user residing in the trust zone of the SRX Series device cannot access a Web page hosted on a server in the DMZ zone. You verity that an active security policy exists on the SRX device that allows the user’s PC to access the Web server with the application HTTP. However, you do not see the security policy access counter increment, nor do you see any information in the log file associated with the security policy.
What is causing the problem?
Which command statement installs the attack database?
You loaded the attack database on your SRX device, but it must be installed. Which command statement installs the attack database?
Which component can you use to find an attack for traffic that uses a nonstandard service?
Which component can you use to find an attack for traffic that uses a nonstandard service?
Which two make up the context of an IPS attack signature?
Which two make up the context of an IPS attack signature? (Choose two.)
Which filter-based forwarding configuration will work for these two customers?
Your company provides a managed network service for its customers. Two of your customers have merged and want to have the same configurations and firewalls. However, they must use their legacy Internet connections. As a result, you need 172.27.0.0/24 to go to ISP A and 172.25.0 0/24 to go to ISP B.
Which filter-based forwarding configuration will work for these two customers?
What is a NULL scan attack and how can you minimize its effects?
What is a NULL scan attack and how can you minimize its effects?