You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?
Click the Exhibit button. You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?A . Cluster nodes require an upgrade to HA compliant Routing Engines.B . Cluster nodes must be connected through a Layer 2 switch.C . There can be active/passive or active/active clusters.D . HA clusters must use...
In this scenario, which statement is true for all affected current sessions?
A routing change occurs on an SRX Series device that involves choosing a new egress interface. In this scenario, which statement is true for all affected current sessions?A . The current session are torn dowm only if the policy-rematchoption has been enabled.B . The current sessions do not change.C ....
Which feature should you implement to satisfy this requirement?
You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers. Which feature should you implement to satisfy this requirement?A . SSL proxyB . AppSecureC . JIMSD . JATPView AnswerAnswer: A
Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)
Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)A . AppQoEB . APBRC . Secure Application ManagerD . AppQoSE . AppFormixView AnswerAnswer: ABD Explanation: Reference: https://www.juniper.net/documentation/en_US/junos/information-products/pathway-pages/security/securityapplication-identification.pdf
What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)
What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)A . protocol anomaly-based attacksB . spam-based attacksC . signature-based attacksD . DDoS-based attacksView AnswerAnswer: AC
Which two statements are correct about server-protection SSP proxy? (Choose two.)
Which two statements are correct about server-protection SSP proxy? (Choose two.)A . The server-protection SSL proxy intercepts the server certificate.B . The server-protection SSL proxy is also known as SSL reverse proxy.C . The server-protection SSL proxy forwards the server certificate after modification.D . The server-protection SSL proxy acts as...
What are two elements of a custom IDP/IPS attack object? (Choose two.)
What are two elements of a custom IDP/IPS attack object? (Choose two.)A . the attack signatureB . the severity of the attackC . the destination zoneD . the exempt rulebaseView AnswerAnswer: AB
Referring to the exhibit, which two file types must be selected to accomplish this task?
Click the Exhibit button. You need to have the JATP solution analyzer .jar, .xls, and .doc files. Referring to the exhibit, which two file types must be selected to accomplish this task? (Choose two.)A . JavaB . libraryC . documentD . executableView AnswerAnswer: BC
What are two examples of RTOs? (Choose two.)
What are two examples of RTOs? (Choose two.)A . IPsec SA entriesB . session table entriesC . fabric link probesD . control link heartbeatsView AnswerAnswer: CD