Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)A . DNS proxy B. client-protection C. server-protection D. Web ProxyView AnswerAnswer: AD
In this scenario, which two application security features should be used?
You are asked to block malicious applications regardless of the port number being used In this scenario, which two application security features should be used? (Choose two)A . AppTrack B. AppFW C. AppQoE D. APPIDView AnswerAnswer: AE
Which two statements are correct about Aup Track? (Choose two)
Which two statements are correct about Aup Track? (Choose two)A . AppTrack can only be configured in the main logical system on an SRX Series device B. AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used C. AppTrack collects traffic flow information including...
Referring to the exhibit, which two statements describe the type of proxy used?
Click the Exhibit button Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)A . forward proxy B. server protection proxy C. reverse proxy D. client protection ProxyView AnswerAnswer: AC
Which statement is correct in this scenario?
Click the Exhibit button. You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the them. Which statement is correct in this scenario?A . Set the maximum C&C entries within the Juniper ATP Cloud GUİ. B. No action is required, the feeds...
Which action should you take to solve this issue?
You are troubleshooting unexpected issues on your JIMS server due to out of order event log timestamps. Which action should you take to solve this issue?A . Enable time synchronization on the domain controllers. B. Enable times synchronization on the JIMS server. C. Enable time synchronization on the SRX Series...
On an SRX Series firewall, what are two ways that Encrypted Traffic Tosights assess the threat of the traffic? (Choose two)
On an SRX Series firewall, what are two ways that Encrypted Traffic Tosights assess the threat of the traffic? (Choose two)A . it decrypts the data to validate the nash B. ,it reviews the timing and frequency of the connections. C. It validates the certificates used. D. It decrypts the...
Which two statements are correct when considering IPS rule base evaluation? (Choose two)
Which two statements are correct when considering IPS rule base evaluation? (Choose two)A . IPS evaluates rules sequentially. B. DIPS applies the least severe action to traffic matching multiple rules. C. IPS applies the most severe action to traffic matching multiple rules D. HPS evaluates rules concurrentlyView AnswerAnswer: BC
What are two reasons for this error?
Click the Exhibit button. When trying to set up a server protection SSL proxy, you receive the error shown in the exhibit What are two reasons for this error? (Choose two)A . The SSL proxy certificate ID is for a forwarding proxy B. The SSL proxy certificate ID is part...
What are two types of system logs that Junos generates? (Choose two.)
What are two types of system logs that Junos generates? (Choose two.)A . system core dump files B. control plane-logs C. data plane logs D. SQL log filesView AnswerAnswer: BC