Which statement is correct about Junos security policies?

Which statement is correct about Junos security policies?A . Security policies enforce rules that should be applied to traffic transiting an SRX Series device. B. Security policies determine which users are allowed to access an SRX Series device. C. Security policies control the flow of internal traffic within an SRX...

May 27, 2023 No Comments READ MORE +

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

What are two Juniper ATP Cloud feed analysis components? (Choose two.)A . IDP signature feed B. C&C cloud feed C. infected host cloud feed D. US CERT threat feedView AnswerAnswer: A,B Explanation: The Juniper ATP Cloud feed analysis components are the IDP signature feed and the C&C cloud feed. The...

May 27, 2023 No Comments READ MORE +

Which Web filtering solution uses a direct Internet-based service for URL categorization?

Which Web filtering solution uses a direct Internet-based service for URL categorization?A . Juniper ATP Cloud B. Websense Redirect C. Juniper Enhanced Web Filtering D. local blocklistView AnswerAnswer: C Explanation: Juniper Enhanced Web Filtering is a web filtering solution that uses a direct Internet-based service for URL categorization. This service...

May 26, 2023 No Comments READ MORE +

Which statement is correct about static NAT?

Which statement is correct about static NAT?A . Static NAT supports port translation. B. Static NAT rules are evaluated after source NAT rules. C. Static NAT implements unidirectional one-to-one mappings. D. Static NAT implements unidirectional one-to-many mappings.View AnswerAnswer: C Explanation: Static NAT (Network Address Translation) is a type of NAT...

May 26, 2023 No Comments READ MORE +

Which two statements about the Junos OS CLI are correct? (Choose two.)

Which two statements about the Junos OS CLI are correct? (Choose two.)A . The default configuration requires you to log in as the admin user. B. A factory-default login assigns the hostname Amnesiac to the device. C. Most Juniper devices identify the root login prompt using the % character. D....

May 26, 2023 No Comments READ MORE +

Which two statements are correct about global policies? (Choose two.)

Which two statements are correct about global policies? (Choose two.)A . Global policies are evaluated after default policies. B. Global policies do not have to reference zone context. C. Global policies are evaluated before default policies. D. Global policies must reference zone contexts.View AnswerAnswer: B,C Explanation: Global policies are used...

May 26, 2023 No Comments READ MORE +

Which two addresses are valid address book entries? (Choose two.)

Which two addresses are valid address book entries? (Choose two.)A . 173.145.5.21/255.255.255.0 B. 153.146.0.145/255.255.0.255 C. 203.150.108.10/24 D. 191.168.203.0/24View AnswerAnswer: A,C Explanation: The correct address book entries are: ✑ 173.145.5.21/255.255.255.0 ✑ 203.150.108.10/24 Both of these entries represent a valid IP address and subnet mask combination, which can be used as an...

May 26, 2023 No Comments READ MORE +

Which two statements are correct about the null zone on an SRX Series device? (Choose two.)

Which two statements are correct about the null zone on an SRX Series device? (Choose two.)A . The null zone is created by default. B. The null zone is a functional security zone. C. Traffic sent or received by an interface in the null zone is discarded. D. You must...

May 25, 2023 No Comments READ MORE +

Which security policy type will be evaluated first?

Which security policy type will be evaluated first?A . A zone policy with no dynamic application set B. A global with no dynamic application set C. A zone policy with a dynamic application set D. A global policy with a dynamic application setView AnswerAnswer: D

May 25, 2023 No Comments READ MORE +

What would be used as a final check in this scenario?

You want to verify the peer before IPsec tunnel establishment. What would be used as a final check in this scenario?A . traffic selector B. perfect forward secrecy C. st0 interfaces D. proxy IDView AnswerAnswer: D Explanation: The proxy ID is used as a final check to verify the peer...

May 24, 2023 No Comments READ MORE +