Which two protocols are used for NSRP IP tracking?
Which two protocols are used for NSRP IP tracking? (Choose two.)
Which three types of status can a member of an NSRP cluster have?
Which three types of status can a member of an NSRP cluster have? (Choose three.)
Which two configuration elements are synchronized between the members of an NSRP cluster?
Which two configuration elements are synchronized between the members of an NSRP cluster?
(Choose two.)
what happens as a result of this failure?
The master device in an NSRP cluster experiences an interface failure on a monitored interface.
By default, what happens as a result of this failure?
What are three valid states for an NSRP member?
What are three valid states for an NSRP member? (Choose three.)
Which two methods will accomplish this task?
While troubleshooting performance issues on your NetScreen cluster, you decide to failover the
master device to its redundant peer. Which two methods will accomplish this task? (Choose two.)
Which command and process are needed to accomplish this task?
You have been making changes on an NSRP cluster and find that the ScreenOS devices are out
of sync. You want to synchronize the devices’ configurations together.
Which command and process are needed to accomplish this task?
Which step would have prevented this situation?
A monitored interface on a clustered pair of ScreenOS devices goes down and both devices
became ineligible to be master of the cluster. As a result, neither device is passing traffic.
Which step would have prevented this situation?
What is causing the problem?
You are receiving 3000 SYN packets per second from multiple outside sources to the same
destination IP address in your network. You want the SYN proxy Screen option to engage when
SYN packets exceed 2000 per second, but the SYN proxy is not engaging.
What is causing the problem?
Which two actions can you configure the device to take?
You have configured deep-packet inspection on a ScreenOS device. You have not modified the
default threshold values. The device detects a single session that matches an attack.
Which two actions can you configure the device to take? (Choose two.)