Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?A . security policy B. host inbound traffic C. application layer gateway D. screen optionView AnswerAnswer: D Explanation: A screen option in the SRX Series device can be used to protect clients...

May 24, 2023 No Comments READ MORE +

What are two functions of Juniper ATP Cloud? (Choose two.)

What are two functions of Juniper ATP Cloud? (Choose two.)A . malware inspection B. Web content filtering C. DDoS protection D. Geo IP feedsView AnswerAnswer: A,D Explanation: Juniper Advanced Threat Prevention (ATP) Cloud is a security service that helps organizations protect against advanced threats by providing real-time threat intelligence and...

May 24, 2023 No Comments READ MORE +

Which two statements about user-defined security zones are correct? (Choose two.)

Which two statements about user-defined security zones are correct? (Choose two.)A . Users cannot share security zones between routing instances. B. Users can configure multiple security zones. C. Users can share security zones between routing instances. D. User-defined security zones do not apply to transit traffic.View AnswerAnswer: B,C Explanation: User-defined...

May 24, 2023 No Comments READ MORE +

What is the main purpose of using screens on an SRX Series device?

What is the main purpose of using screens on an SRX Series device?A . to provide multiple ports for accessing security zones B. to provide an alternative interface into the CLI C. to provide protection against common DoS attacks D. to provide information about traffic patterns traversing the networkView AnswerAnswer:...

May 24, 2023 No Comments READ MORE +

Which two statements are correct about IPsec security associations? (Choose two.)

Which two statements are correct about IPsec security associations? (Choose two.)A . IPsec security associations are bidirectional. B. IPsec security associations are unidirectional. C. IPsec security associations are established during IKE Phase 1 negotiations. D. IPsec security associations are established during IKE Phase 2 negotiations.View AnswerAnswer: A,D Explanation: The two...

May 23, 2023 No Comments READ MORE +

Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)

Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)A . Junos-host B. functional C. null D. managementView AnswerAnswer: A,C Explanation: Junos-host and null are two non-configurable zones that exist by default on an SRX Series device. Junos-host is the default zone for all internal interfaces...

May 23, 2023 No Comments READ MORE +

Which Juniper ATP feature should you configure to accomplish this task?

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack. Which Juniper ATP feature should you configure to accomplish this task?A . IPsec B. static NAT C. allowlists D. C&C feedsView...

May 23, 2023 No Comments READ MORE +

What does the number ‘’2’’ indicate in interface ge―0/1/2?

What does the number ‘’2’’ indicate in interface ge―0/1/2?A . The interface logical number B. The physical interface card (PIC) C. The port number D. The flexible PIC concentrator (FPC)View AnswerAnswer: C

May 23, 2023 No Comments READ MORE +

Which two components are required to implement Juniper Secure Connect to satisfy this requirement?

You want to provide remote access to an internal development environment for 10 remote developers. Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)A . an additional license for an SRX Series device B. Juniper Secure Connect client software C. an SRX Series...

May 22, 2023 No Comments READ MORE +

What is the order of the first path packet processing when a packet enters a device?

What is the order of the first path packet processing when a packet enters a device?A . security policies C> screens C> zones B. screens C> security policies C> zones C. screens C> zones C> security policies D. security policies C> zones C> screensView AnswerAnswer: C

May 22, 2023 No Comments READ MORE +