Which type of security policy protect restricted services from running on non-standard ports?
Which type of security policy protect restricted services from running on non-standard ports?A . Application firewallB . IDPC . Sky ATPD . antivirusView AnswerAnswer: B
what should you do to solve this problem?
Referring to the exhibit. Users should not have access to Facebook, however, a recent examination of the logs security show that users are accessing Facebook. what should you do to solve this problem?A . Change the source address for the Block-Facebook-Access rule to the prefix of the usersB . Move...
What would be used to accomplish this task?
You want to automatically generate the encryption and authentication keys during IPsec VPN establishment. What would be used to accomplish this task?A . IPsecB . Diffie_HellmanC . Main modeD . Aggregate modeView AnswerAnswer: B
What are the valid actions for a source NAT rule in J-Web? (choose three.)
What are the valid actions for a source NAT rule in J-Web? (choose three.)A . OnB . OffC . PoolD . SourceE . interfaceView AnswerAnswer: BCE Explanation: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/nat-security-source-andsource-pool.html
Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)
Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)A . Destination zoneB . Destination interfaceC . Source interfaceD . Source zoneView AnswerAnswer: BD
Which two segments describes IPsec VPNs? (Choose two.)
Which two segments describes IPsec VPNs? (Choose two.)A . IPsec VPN traffic is always authenticated.B . IPsec VPN traffic is always encrypted.C . IPsec VPNs use security to secure traffic over a public network between two remote sites.D . IPsec VPNs are dedicated physical connections between two private networks.View AnswerAnswer:...
Why is this problem happening?
Referring to the exhibit. Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook. Why is this problem happening?A . Global rules are honored before zone-based rules.B . The internet-Access rule has a higher precedence valueC . The...
On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office-using a dynamic IP address?
On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office-using a dynamic IP address?A . Configure the IPsec policy to use MDS authentication.B . Configure the IKE policy to use aggressive mode.C . Configure the IPsec policy to use aggressive...
In this scenario, what do you configure to accomplish this task?
On an SRX device, you want to regulate traffic base on network segments. In this scenario, what do you configure to accomplish this task?A . ScreensB . ZonesC . ALGsD . NATView AnswerAnswer: B
BY default, revenue interface are placed into which system-defined security zone on an SRX series device?
BY default, revenue interface are placed into which system-defined security zone on an SRX series device?A . TrustB . NullC . Junos-trustD . untrustView AnswerAnswer: D