Which three elements are used for matching the traffic direction in the from and to statements?
You are configuring source NAT.
Which three elements are used for matching the traffic direction in the from and to
statements? (Choose three.)
What else must be configured to make the addresses in the pool usable?
You have just configured source NAT with a pool of addresses within the same subnet as
the egress interface.
What else must be configured to make the addresses in the pool usable?
Which statement is true?
You have just changed a NAT rule and committed the change.
Which statement is true?
Which configuration allows direct access to the 10.10.10.0/24 network without NAT, but uses NAT for all other
Which configuration allows direct access to the 10.10.10.0/24 network without NAT, but uses
NAT for all other traffic from the untrust zone to the egress interface?
Which two actions occur during IKE Phase 1?
Which two actions occur during IKE Phase 1? (Choose two.)
What are two valid symmetric encryption key types?
What are two valid symmetric encryption key types? (Choose two.)
Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment?
Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment? (Choose
two.)
Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged throug
Which three algorithms are used by an SRX Series device to validate the integrity of the data
exchanged through an IPsec VPN? (Choose three.)
Which algorithm should you use?
You are asked to implement the hashing algorithm that uses the most bits in the calculation
on your Junos security device.
Which algorithm should you use?
Which IKE Phase 1 mode must you use?
You are asked to establish an IPsec VPN to a remote device whose IP address is
dynamically assigned by the ISP.
Which IKE Phase 1 mode must you use?