3 Months Free Update
3 Months Free Update
3 Months Free Update
You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
You want to use IPS signatures to monitor traffic.
Which module in the AppSecure suite will help in this task?
After JSA receives external events and flows, which two steps occur? (Choose two.)
You are deploying a new SRX Series device and you need to log denied traffic.
In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)
Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP addresses? (Choose two.)
Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)
Exhibit
Which two statements are correct about the configuration shown in the exhibit? (Choose two.)
You want to show tabular data for operational mode commands.
In this scenario, which logging parameter will provide this function?
Exhibit
Referring to the exhibit, what do you determine about the status of the cluster.
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which two statements are correct when considering IPS rule base evaluation? (Choose two.)
Your manager asks you to provide firewall and NAT services in a private cloud.
Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)
You are experiencing excessive packet loss on one of your two WAN links route traffic from the degraded link to the working link
Which AppSecure component would you use to accomplish this task?
Your network uses a single JSA host and you want to implement a cluster.
In this scenario, which two statements are correct? (Choose two.)
You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.
Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?
What are two benefits of using a vSRX in a software-defined network? (Choose two.)
You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?
Which two statements are correct about SSL proxy server protection? (Choose two.)