In this scenario, what are two requirements to accomplish this task?
You want to enable the minimum Juniper ATP services on a branch SRX Series device. In this scenario, what are two requirements to accomplish this task? (Choose two.)A . Install a basic Juniper ATP license on the branch device. B. Configure the juniper-atp user account on the branch device. C....
Which IPsec protocol is used to encrypt the data payload?
Which IPsec protocol is used to encrypt the data payload?A . ESP B. IKE C. AH D. TCPView AnswerAnswer: A
Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)
Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)A . SHA-1 B. SHAKE128 C. MD5 D. RIPEMD-256View AnswerAnswer: A,C
What information does the show chassis routing-engine command provide?
What information does the show chassis routing-engine command provide?A . chassis serial number B. resource utilization C. system version D. routing tablesView AnswerAnswer: B
Which two IKE Phase 1 configuration options must match on both peers to successfully establish a tunnel? (Choose two.)
Which two IKE Phase 1 configuration options must match on both peers to successfully establish a tunnel? (Choose two.)A . VPN name B. gateway interfaces C. IKE mode D. Diffie-Hellman groupView AnswerAnswer: C,D
Which statement is correct about packet mode processing?
Which statement is correct about packet mode processing?A . Packet mode enables session-based processing of incoming packets. B. Packet mode works with NAT, VPNs, UTM, IDP, and other advanced security services. C. Packet mode bypasses the flow module. D. Packet mode is the basis for stateful processing.View AnswerAnswer: C
What is the order of the first path packet processing when a packet enters a device?
What is the order of the first path packet processing when a packet enters a device?A . security policies C> screens C> zones B. screens C> security policies C> zones C. screens C> zones C> security policies D. security policies C> zones C> screensView AnswerAnswer: C
Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)
Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)A . the content filtering UTM feature B. the antivirus UTM feature C. the Web filtering UTM feature D. the antispam UTM featureView AnswerAnswer: A,C
Which three Web filtering deployment actions are supported by Junos? (Choose three.)
Which three Web filtering deployment actions are supported by Junos? (Choose three.)A . Use IPS. B. Use local lists. C. Use remote lists. D. Use Websense Redirect. E. Use Juniper Enhanced Web Filtering.View AnswerAnswer: B,D,E
Which two statements are correct about screens? (Choose two.)
Which two statements are correct about screens? (Choose two.)A . Screens process inbound packets. B. Screens are processed on the routing engine. C. Screens process outbound packets. D. Screens are processed on the flow module.View AnswerAnswer: A,D