You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

Click the Exhibit button. You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C

May 28, 2020 No Comments READ MORE +

Which statement is true about high availability (HA) chassis clusters for the SRX Series device?

Which statement is true about high availability (HA) chassis clusters for the SRX Series device?A . Cluster nodes require an upgrade to HA compliant Routing Engines.B . Cluster nodes must be connected through a Layer 2 switch.C . There can be active/passive or active/active clusters.D . HA clusters must use...

May 27, 2020 No Comments READ MORE +

In this scenario, which statement is true for all affected current sessions?

A routing change occurs on an SRX Series device that involves choosing a new egress interface. In this scenario, which statement is true for all affected current sessions?A . The current session are torn dowm only if the policy-rematchoption has been enabled.B . The current sessions do not change.C ....

May 27, 2020 No Comments READ MORE +

Which feature should you implement to satisfy this requirement?

You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers. Which feature should you implement to satisfy this requirement?A . SSL proxyB . AppSecureC . JIMSD . JATPView AnswerAnswer: A

May 26, 2020 No Comments READ MORE +

Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)

Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)A . AppQoEB . APBRC . Secure Application ManagerD . AppQoSE . AppFormixView AnswerAnswer: ABD Explanation: Reference: https://www.juniper.net/documentation/en_US/junos/information-products/pathway-pages/security/security­application-identification.pdf

May 25, 2020 No Comments READ MORE +

What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)

What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)A . protocol anomaly-based attacksB . spam-based attacksC . signature-based attacksD . DDoS-based attacksView AnswerAnswer: AC

May 24, 2020 No Comments READ MORE +

Which two statements are correct about server-protection SSP proxy? (Choose two.)

Which two statements are correct about server-protection SSP proxy? (Choose two.)A . The server-protection SSL proxy intercepts the server certificate.B . The server-protection SSL proxy is also known as SSL reverse proxy.C . The server-protection SSL proxy forwards the server certificate after modification.D . The server-protection SSL proxy acts as...

May 22, 2020 No Comments READ MORE +

What are two elements of a custom IDP/IPS attack object? (Choose two.)

What are two elements of a custom IDP/IPS attack object? (Choose two.)A . the attack signatureB . the severity of the attackC . the destination zoneD . the exempt rulebaseView AnswerAnswer: AB

May 21, 2020 No Comments READ MORE +

Referring to the exhibit, which two file types must be selected to accomplish this task?

Click the Exhibit button. You need to have the JATP solution analyzer .jar, .xls, and .doc files. Referring to the exhibit, which two file types must be selected to accomplish this task? (Choose two.)A . JavaB . libraryC . documentD . executableView AnswerAnswer: BC

May 19, 2020 No Comments READ MORE +

What are two examples of RTOs? (Choose two.)

What are two examples of RTOs? (Choose two.)A . IPsec SA entriesB . session table entriesC . fabric link probesD . control link heartbeatsView AnswerAnswer: CD

May 18, 2020 No Comments READ MORE +