What are two reasons for using cSRX over vSRX? (Choose two.)
What are two reasons for using cSRX over vSRX? (Choose two.)A . cSRX loads fasterB . cSRX uses less memoryC . cSRX supports the BGP protocolD . cSRX supports IPsecView AnswerAnswer: AB Explanation: Reference: https://www.juniper.net/documentation/en_US/csrx/information-products/pathway-pages/security-csrx-linux-bm-guide-pwp.pdf
Which type of security solution is shown in this exhibit?
Click the Exhibit button. Which type of security solution is shown in this exhibit?A . service chain modelB . centralized modelC . inline security modelD . de-centralized modelView AnswerAnswer: A
In your design, which function should be implemented?
You must allow applications to connect to external servers. The session has embedded IP address information to enable the remote system to establish a return session. In your design, which function should be implemented?A . source NATB . application layer gatewayC . destination NATD . HTTP redirectView AnswerAnswer: A
Which two statements are correct in this scenario?
You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs. Which two statements are correct in this scenario? (Choose two.)A . Distributed ISGs typically have less latency compared to centralized ISGsB . Distributed ISGs reduce bandwidth for end...
Which feature should you use in this situation?
You are using SRX Series devices to secure your network and you require sandboxing for malicious file detonation. However, per company policy, you cannot send potentially malicious files outside your network for sandboxing. Which feature should you use in this situation?A . Sky ATPB . UTM antivirusC . IPSD ....
Which mechanism will satisfy this requirement?
You are asked to install a mechanism to protect an ISP network from denial-of-service attacks from a small number of sources. Which mechanism will satisfy this requirement?A . RTBHB . UTMC . Sky ATPD . GeoIPView AnswerAnswer: A Explanation: Reference: https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf
Which Junos OS feature will provide this protection?
Your customer needs help designing a single solution to protect their combination of various Junos network devices from unauthorized management access. Which Junos OS feature will provide this protection?A . Use a firewall filter applied to the fxp0 interfaceB . Use a security policy with the destination of the junos-host...
Which two design changes satisfy these requirements?
Your company has outgrown its existing secure enterprise WAN that is configured to use OSPF, AutoVPN, and IKE version 1. You are asked if it is possible to make a design change to improve the WAN performance without purchasing new hardware. Which two design changes satisfy these requirements? (Choose two.)A...
Which component supports the SRX Series devices in this scenario?
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points. Which component supports the SRX Series...
Which Juniper Networks solution satisfies this requirement?
You are responding to an RFP for securing a large enterprise. The RFP requires an onsite security solution which can use logs from third-party sources to prevent threats. The solution should also have the capability to detect and stop zero-day attacks. Which Juniper Networks solution satisfies this requirement?A . IDPB...