What are two types of system logs that Junos generates? (Choose two.)

What are two types of system logs that Junos generates? (Choose two.)A . SQL log files B. data plane logs C. system core dump files D. control plane logsView AnswerAnswer: B D Explanation: The two types of system logs that Junos generates are control plane logs and data plane logs....

May 22, 2023 No Comments READ MORE +

After JSA receives external events and flows, which two steps occur? (Choose two.)

After JSA receives external events and flows, which two steps occur? (Choose two.)A . After formatting the data, the data is stored in an asset database. B. Before formatting the data, the data is analyzed for relevant information. C. Before the information is filtered, the information is formatted D. After...

May 22, 2023 No Comments READ MORE +

Using the information from the exhibit, which statement is correct?

Exhibit Using the information from the exhibit, which statement is correct?A . Redundancy group 1 is in an ineligible state. B. Node1 is the active node for the control plane C. There are no issues with the cluster. D. Redundancy group 0 is in an ineligible state.View AnswerAnswer: A

May 21, 2023 No Comments READ MORE +

Which two statements are correct in this scenario about the control-link settings?

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering. Which two statements are correct in this scenario about the control-link settings? (Choose two.)A . In the vSwitch security settings, accept promiscuous mode. B. In the vSwitch properties...

May 20, 2023 No Comments READ MORE +

Which feed will the clients IP address be automatically added to in this situation?

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold. Which feed will the clients IP address be automatically added to in this situation?A . the command-and-control cloud feed B. the allowlist and blocklist feed C. the custom cloud feed D....

May 20, 2023 No Comments READ MORE +

In this scenario, which two statements are correct?

You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows. In this scenario, which two statements are correct? (Choose two.)A . The early-ageout configuration specifies the timeout value, in...

May 19, 2023 No Comments READ MORE +

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?A . The active sessions allowed by the policy will be dropped. B. The active sessions allowed by the policy will be marked as a legacy flow and will continue...

May 18, 2023 No Comments READ MORE +

Which configuration should you use in this scenario?

Your company is using the Juniper ATP Cloud free model. The current inspection profile is set at 10 MB You are asked to configure ATP Cloud so that executable files up to 30 MB can be scanned while at the same time minimizing the change in scan time for other...

May 18, 2023 No Comments READ MORE +

Which action should you take in this situation?

You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?A . Connect JIMS to the RADIUS server B. Connect JIMS to the domain Exchange server C. Connect JIMS to the domain SQL server. D. Connect JIMS to another...

May 18, 2023 No Comments READ MORE +

Referring to the exhibit which statement is true?

Exhibit Referring to the exhibit which statement is true?A . SSL proxy functions will ignore the session. B. SSL proxy leverages post-match results. C. SSL proxy must wait for return traffic for the final match to occur. D. SSL proxy leverages pre-match resultView AnswerAnswer: D

May 17, 2023 No Comments READ MORE +