which method does the lot Security feature use to identify traffic sourced from loT devices?
which method does the lot Security feature use to identify traffic sourced from loT devices?A . The SRX Series device identifies loT devices from metadata extracted from their transit traffic. B. The SRX Series device streams transit traffic received from the loT device to Juniper ATP Cloud C. The SRX...
How does Juniper ATP Cloud protect a network from zero-day threats?
How does Juniper ATP Cloud protect a network from zero-day threats?A . lt uses known virus signatures: B. It uses a cache lookup: C. lt uses dynamic analysis D. It uses antivirus softwareView AnswerAnswer: A
Which solution enables you to create security policies that include user and group information?
Which solution enables you to create security policies that include user and group information?A . NETCONF B. JIMS C. ATP Appliance D. Network DirectorView AnswerAnswer: A
Which two statements are correct about the Junos IPS feature? (Choose two)
Which two statements are correct about the Junos IPS feature? (Choose two)A . IPS uses sandboxing to detect unknown attacks, B. IPS is integrated as a security service on SRX Series devices. C. DIPS uses protocol anomaly rules to detect unknown attacks D. DIPS is a standalone platform running on...
Which function does this command accomplish?
While working on an SRX firewall, you execute the show security policies policy-name <name> detail command Which function does this command accomplish?A . It shows the system log files for the local SRX Series device B. lt identifies the different custom policies enabled. C. It shows policy counters for a...
Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)
Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)A . DNS B. Microsoft Exchange Server event logs C. OpenLDAP service ports D. Active Directory domain controller event logsView AnswerAnswer: CD
Using the information from the exhibit, which statement is correct?
Click the Exhibit button. Using the information from the exhibit, which statement is correct?A . Redundancy group 1 is in an ineligible state. B. Node 1 is the active node for the control plane C. Redundancy group 0 is in an ineligible state. D. There are no issues with the...
How do you solve this problem?
Click the Exhibit button. You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit. How do you solve this problem?A . Reboot the SRX Series device B. Import the existing certificate to each client device C. Install a new SRX Series device to act...
Which two statements are correct about SSL proxy server protection? (Choose two)
Which two statements are correct about SSL proxy server protection? (Choose two)A . You do not need to configure the servers to use the SSL proxy function on the SRX Series device. B. You must load the server certificates on the SRX Series device. C. The servers must be configured...
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)A . The Junos OS supports only one fab link. B. The fab link does not support fragmentation C. The fab link supports traditional interface features D. The physical interface for the fab link must be...