Which statement is correct about Junos security policies?
Which statement is correct about Junos security policies?A . Security policies enforce rules that should be applied to traffic transiting an SRX Series device. B. Security policies determine which users are allowed to access an SRX Series device. C. Security policies control the flow of internal traffic within an SRX...
What are two Juniper ATP Cloud feed analysis components? (Choose two.)
What are two Juniper ATP Cloud feed analysis components? (Choose two.)A . IDP signature feed B. C&C cloud feed C. infected host cloud feed D. US CERT threat feedView AnswerAnswer: A,B Explanation: The Juniper ATP Cloud feed analysis components are the IDP signature feed and the C&C cloud feed. The...
Which Web filtering solution uses a direct Internet-based service for URL categorization?
Which Web filtering solution uses a direct Internet-based service for URL categorization?A . Juniper ATP Cloud B. Websense Redirect C. Juniper Enhanced Web Filtering D. local blocklistView AnswerAnswer: C Explanation: Juniper Enhanced Web Filtering is a web filtering solution that uses a direct Internet-based service for URL categorization. This service...
Which statement is correct about static NAT?
Which statement is correct about static NAT?A . Static NAT supports port translation. B. Static NAT rules are evaluated after source NAT rules. C. Static NAT implements unidirectional one-to-one mappings. D. Static NAT implements unidirectional one-to-many mappings.View AnswerAnswer: C Explanation: Static NAT (Network Address Translation) is a type of NAT...
Which two statements about the Junos OS CLI are correct? (Choose two.)
Which two statements about the Junos OS CLI are correct? (Choose two.)A . The default configuration requires you to log in as the admin user. B. A factory-default login assigns the hostname Amnesiac to the device. C. Most Juniper devices identify the root login prompt using the % character. D....
Which two statements are correct about global policies? (Choose two.)
Which two statements are correct about global policies? (Choose two.)A . Global policies are evaluated after default policies. B. Global policies do not have to reference zone context. C. Global policies are evaluated before default policies. D. Global policies must reference zone contexts.View AnswerAnswer: B,C Explanation: Global policies are used...
Which two addresses are valid address book entries? (Choose two.)
Which two addresses are valid address book entries? (Choose two.)A . 173.145.5.21/255.255.255.0 B. 153.146.0.145/255.255.0.255 C. 203.150.108.10/24 D. 191.168.203.0/24View AnswerAnswer: A,C Explanation: The correct address book entries are: ✑ 173.145.5.21/255.255.255.0 ✑ 203.150.108.10/24 Both of these entries represent a valid IP address and subnet mask combination, which can be used as an...
Which two statements are correct about the null zone on an SRX Series device? (Choose two.)
Which two statements are correct about the null zone on an SRX Series device? (Choose two.)A . The null zone is created by default. B. The null zone is a functional security zone. C. Traffic sent or received by an interface in the null zone is discarded. D. You must...
Which security policy type will be evaluated first?
Which security policy type will be evaluated first?A . A zone policy with no dynamic application set B. A global with no dynamic application set C. A zone policy with a dynamic application set D. A global policy with a dynamic application setView AnswerAnswer: D
What would be used as a final check in this scenario?
You want to verify the peer before IPsec tunnel establishment. What would be used as a final check in this scenario?A . traffic selector B. perfect forward secrecy C. st0 interfaces D. proxy IDView AnswerAnswer: D Explanation: The proxy ID is used as a final check to verify the peer...