Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values configured on the SRX client?
Click the Exhibit button. Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values configured on the SRX client? (Choose two.)A . IPv6 ReportingB . Client IDC . Client SecretD . Token LifetimeView AnswerAnswer: B,C Explanation: Reference: https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-srx-configuring.html
Which two statements describe JSA? (Choose two.)
Which two statements describe JSA? (Choose two.)A . Security Director must be used to view third-party events rom JSA flow collectors.B . JSA supports events and flows from Junos devices, including third-party devices.C . JSA events must be manually imported into Security Directory using an SSH connection.D . JSA can...
In this scenario, which two elements are mapped to applications in the application system cache?
You are deploying the Junos application firewall feature in your network. In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)A . destination portB . source portC . destination IP addressD . source IP addressView AnswerAnswer: A,C
Which statement is correct in this scenario?
You are configuring a client-protection SSL proxy profile. Which statement is correct in this scenario?A . A server certificate is not used but a root certificate authority is used.B . A server certificate and root certificate authority are not used.C . A server certificate is used but a root certificate...
Referring to the exhibit, which statement is true?
Click the Exhibit button. Referring to the exhibit, which statement is true?A . IDP blocks root users.B . IDP closes the connection on matched sessions.C . IDP ignores the connection on matched sessions.D . IDP blocks all users.View AnswerAnswer: C
Which two statements describe application-layer gateways (ALGs)? (Choose two.)
Which two statements describe application-layer gateways (ALGs)? (Choose two.)A . ALGs are designed for specific protocols that require multiple sessions.B . ALGs are used with protocols that use multiple ports.C . ALGs can only be configured using Security Director.D . ALGs are designed for specific protocols that use a single...
What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?
What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?A . 4B . 10C . 3D . 12View AnswerAnswer: B
When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)
When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)A . A security policy can reference both a client-protection SSL proxy profile and a server-protection proxy profile.B . If you apply an SSL proxy profile to a security policy and forget to apply...
What must be enabled on the interconnecting switch to accomplish this task?
You want to support reth LAG interfaces on a chassis cluster. What must be enabled on the interconnecting switch to accomplish this task?A . RSTPB . 802.3adC . LLDPD . swfabView AnswerAnswer: B Explanation: Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-redundant-ethernet-lag-interfaces.html
Which two statements are correct about server-protection SSP proxy? (Choose two.)
Which two statements are correct about server-protection SSP proxy? (Choose two.)A . The server-protection SSL proxy intercepts the server certificate.B . The server-protection SSL proxy is also known as SSL reverse proxy.C . The server-protection SSL proxy forwards the server certificate after modification.D . The server-protection SSL proxy acts as...