What are two network scanning methods?
What are two network scanning methods? (Choose two.)
What are two intrusion protection mechanisms available on SRX Series Services Gateways?
What are two intrusion protection mechanisms available on SRX Series Services Gateways?
(Choose two.)
What is a benefit of using a dynamic VPN?
What is a benefit of using a dynamic VPN?
What is a benefit of using a group VPN?
What is a benefit of using a group VPN?
Which statement is true about Layer 2 zones when implementing transparent mode security?
Which statement is true about Layer 2 zones when implementing transparent mode security?
What are two AppSecure modules?
What are two AppSecure modules? (Choose two.)
How would you accomplish this goal?
You are working as a security administrator and must configure a solution to protect against
distributed botnet attacks on your company’s central SRX cluster.
How would you accomplish this goal?
Which two methods will accomplish this goal?
You are asked to change the configuration of your company’s SRX device so that you can block
nested traffic from certain Web sites, but the main pages of these Web sites must remain available
to users. Which two methods will accomplish this goal? (Choose two.)
which threshold will the bot clients no longer be classified as malicious?
You are using the AppDoS feature to control against malicious bot client attacks. The bot clients
are using file downloads to attack your server farm. You have configured a context value rate of
10,000 hits in 60 seconds. At which threshold will the bot clients no longer be classified as
malicious?
What are three components used to accomplish this task?
Your company’s network has seen an increase in Facebook-related traffic. You have been asked
to restrict the amount of Facebook-related traffic to less than 100 Mbps regardless of congestion.
What are three components used to accomplish this task? (Choose three.)