Referring to the exhibit, which two statements are true?
Click the Exhibit button. Referring to the exhibit, which two statements are true? (Choose two.)A . Events based on this third-party feed will not affect a host’s threat scoreB . SRX Series devices will block traffic based on this third-party feedC . SRX Series devices will not block traffic based...
Which firewall filter will accomplish this task?
You are asked to configure an SRX Series device to bypass all security features for IP traffic from the engineering department. Which firewall filter will accomplish this task? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: D
What will satisfy this requirement?
You are asked to configure an IPsec VPN between two SRX Series devices that allows for processing of CoS on the intermediate routers. What will satisfy this requirement?A . route-based VPNB . OpenVPNC . remote access VPND . policy-based VPNView AnswerAnswer: A Explanation: Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/secuirty-cos-based-ipsec-vpns.html
Which two statements are true in this scenario?
Click the Exhibit button. You are implementing a new branch site and want to ensure Internet traffic is sent directly to your ISP and other traffic is sent to your company headquarters. You have configured filter-based forwarding to accomplish this objective. You verify proper functionality using the outputs shown in...
Which two commands will solve this problem?
Exhibit. Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly. Which two commands will solve this problem? (Choose two.)A . [edit interfaces] user@srx# delete st0.0 multipointB . [edit security ike gateway advpn-gateway] user@srx# delete advpn partnerC . [edit security ike gateway advpn-gateway] user@srx# set version...
Which action will solve the problem?
Click the Exhibit button. The exhibit shows a snippet of a security flow trace. A user cannot open an SSH session to a server . Which action will solve the problem?A . Create a security policy that matches the traffic parametersB . Edit the source NAT to correct the translated...
What is the reason for this behavior?
According to the log shown in the exhibit, you notice the IPsec session is not establishing. What is the reason for this behavior?A . Mismatched proxy IDB . Mismatched peer IDC . Mismatched preshared keyD . Incorrect peer address.View AnswerAnswer: B Explanation: https://www.juniper.net/documentation/en_US/release-independent/nce/topics/example/policy-based-vpn-using-j-series-srxseries-device-configuring.html
Which two IDP attack objects would you configure to solve this problem?
You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to configure the IDP feature on your SRX Series device to block this attack. Which two IDP attack objects would you configure to solve this problem? (Choose two.)A . NetworkB . SignatureC...
Referring to the exhibit, which two statements are true?
Click the Exhibit button. Referring to the exhibit, which two statements are true? (Choose two.)A . The SRX Series device is enrolled and communicating with a JATP ApplianceB . The JATP Appliance cannot download the security feeds from the GSS serversC . The SRX Series device cannot download the security...
Which two statement are true in this scenario?
You have designed the firewall filter shown in the exhibit to limit SSH control traffic to yours SRX Series device without affecting other traffic. Which two statement are true in this scenario? (Choose two.)A . The filter should be applied as an output filter on the loopback interface.B . Applying...