Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS?
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS?
(Choose three.)
which two values?
A security association is uniquely identified by which two values? (Choose two.)
Which two parameters must be identical to the remote device’s parameters when designing the local IKE pr
You are asked to establish an IPsec VPN between two sites. The remote device has been
preconfigured.
Which two parameters must be identical to the remote device’s parameters when designing
the local IKE proposal? (Choose two.)
Which two statements are correct about IPsec security associations?
Which two statements are correct about IPsec security associations? (Choose two.)
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 second
You are deploying a branch site which connects to two hub locations over an IPsec VPN.
The branch SRX Series device should send all traffic to the first hub unless it is unreachable
and should then direct traffic to the second hub. You must use static routes to send traffic
towards the hub site.
Which two technologies should you use to fail over from a primary to a secondary tunnel in
less than 60 seconds? (Choose two.)
Which two statements are correct regarding reth interfaces?
Which two statements are correct regarding reth interfaces? (Choose two.)
Which two statements are correct about establishing a chassis cluster with IPv6?
Which two statements are correct about establishing a chassis cluster with IPv6? (Choose
two.)
Which setting should you use?
You are asked to set up a chassis cluster between your SRX Series devices. You must
ensure that the solution provides both dual redundant links per node and node redundancy.
Which setting should you use?
What is supported on the fabric link?
What is supported on the fabric link?
What would ensure this behavior?
You are asked to establish a chassis cluster between two SRX Series devices. You must
ensure that end-to-end connectivity is monitored and that the redundancy group will fail over
to the other node if the remote device becomes unreachable.
What would ensure this behavior?