3 Months Free Update
3 Months Free Update
3 Months Free Update
Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)
In J-Web. the management and loopback address configuration option allows you to configure which area?
When configuring antispam, where do you apply any local lists that are configured?
Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)
You want to verify the peer before IPsec tunnel establishment.
What would be used as a final check in this scenario?
You want to provide remote access to an internal development environment for 10 remote developers.
Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)
You are asked to configure your SRX Series device to block all traffic from certain countries. The solution must be automatically updated as IP prefixes become allocated to those certain countries.
Which Juniper ATP solution will accomplish this task?
You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.
What information will this command provide? (Choose two.)
You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.
Which NAT configuration is appropriate in this scenario?
You have an FTP server and a webserver on the inside of your network that you want to make available to users outside of the network. You are allocated a single public IP address.
In this scenario, which two NAT elements should you configure? (Choose two.)
You are creating Ipsec connections.
In this scenario, which two statements are correct about proxy IDs? (Choose two.)
Which two statements are correct about IPsec security associations? (Choose two.)
Which statement is correct about global security policies on SRX Series devices?
Click the Exhibit button.
You are asked to allow only ping and SSH access to the security policies shown in the exhibit.
Which statement will accomplish this task?
Which statement is correct about unified security policies on an SRX Series device?
Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.
In this scenario, which security feature would you use to satisfy this request?
Which two criteria should a zone-based security policy include? (Choose two.)
What are three primary match criteria used in a Junos security policy? (Choose three.)