What should you do to meet the requirements?
Your company recently acquired another company. During a site visit and network audit, you recognize that the acquired company’s private network address space overlaps with yours. You will eventually merge the networks, but for the moment, you must make communication between the networks work over the Internet as a first step toward the migration.
What should you do to meet the requirements?
What are two reasons why this happens?
You have implemented a chassis cluster that spans a Layer 2 network between two office campuses. You are using dual fabric links. Some of the RTOs are getting lost.
What are two reasons why this happens? (Choose two.)
Which persistent NAT parameter should you configure?
You have configured persistent NAT in your NAT rule base. You create a security policy in the direction of external to internal.
Which persistent NAT parameter should you configure?
which step?
In the sequence of IPS inspection steps, protocol anomaly detection is performed after which step?
Which SRX VPN feature would you use to cause the route-based VPN with preference 10 to be used?
You have configured your SRX Series device with two route-based VPNs for the same destination network Remote SRX Series device A’s route has a preference of 5 and remote SRX Series device B has a preference of 10. Users complain they cannot reach the networks through the VPN tunnel. You verify the VPN’s status and discover that the IKE Phase 1 and Phase 2 security associations are active, but the remote networks are not reachable.
Which SRX VPN feature would you use to cause the route-based VPN with preference 10 to be used?
Which statement is true?
You have a branch location connected to a virtual-router type of routing-instance. To provide Internet access, one requirement is to provide connectivity to an interface and its direct route, which belongs to the default inet.0 routing-instance.
Which statement is true?
Which VPN technique can be used on your remote office SRX Series device?
Your company is bringing a remote office online and will use VPN connectivity for access to resources between offices. The remote SRX Series device has an IP address, which it obtained dynamically from a service provider.
Which VPN technique can be used on your remote office SRX Series device?
What is the attacker doing with these packets?
You notice an unusual increase in activity in your network. You investigate by reviewing logs and analyzing traffic flows. In your analysis, you identify a remote host is sending traffic to your network with random TCP flags set including URG PSH, ACK and FIN.
What is the attacker doing with these packets?
Which solution accomplishes this task?
You need to establish a new point-to-point IPSec VPN to a recently acquired remote site. The remote site is currently using the same network space with many overlapping IP addresses. You have been asked to implement an interim solution until there is time to migrate the remote site to a different network space.
Which solution accomplishes this task?
What can you do to resolve this problem?
You have been asked to troubleshoot a VoIP connectivity problem that occurs every t me the IPSec VPN tunnel drops. The SRX Series device has a default route to the Internet and receives a more specific route for the VoIP server over the IPSec tunnel using OSPF. Every time the tunnel drops, when the tunnel re-establishes, the NOC must manually clear the sessions on the SRX device for these VoIP sessions to work again.
What can you do to resolve this problem?