How many IKE security associations are required between the IPsec peers in this scenario?
Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?A . 1B . 3C . 4D . 2View AnswerAnswer: A
Referring to the exhibit, which two statements are true?
Exhibit Referring to the exhibit, which two statements are true? (Choose two.)A . The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.B . You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.C . The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is...
Which two types of source NAT translations are supported in this scenario? (Choose two.)
Which two types of source NAT translations are supported in this scenario? (Choose two.)A . translation of IPv4 hosts to IPv6 hosts with or without port address translationB . translation of one IPv4 subnet to one IPv6 subnet with port address translationC . translation of one IPv6 subnet to another...
Which two steps will accomplish this goal on an SRX Series firewall?
You are asked to detect domain generation algorithms Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)A . Define an advanced-anti-malware policy under [edit services].B . Attach the security-metadata-streaming policy to a securityC . Define a security-metadata-streaming policy under [editD . Attach the advanced-anti-malware policy...
Referring to the exhibit, which two statements are true?
Exhibit Referring to the exhibit, which two statements are true? (Choose two.)A . The SRX-1 device can use the Proxy__Nodes feed in another security policy.B . You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.C ....
Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?
Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?A . The number of traffic selectors configured for the VPN.B . The number of CoS queues configured for the VPN.C . The number of classifiers configured for the VPN.D . The number of...
What are two valid modes for the Juniper ATP Appliance? (Choose two.)
What are two valid modes for the Juniper ATP Appliance? (Choose two.)A . flow collectorB . event collectorC . all-in-oneD . coreView AnswerAnswer: C D
Which statement is true about persistent NAT types?
Which statement is true about persistent NAT types?A . The target-host-port parameter cannot be used with IPv4 addresses in NAT46.B . The target-host parameter cannot be used with IPv6 addressee in NAT64.C . The target-host parameter cannot be used with IPv4 addresses inNAT46D . The target-host-port parameter cannot be used...
Referring to the exhibit, which two commands would correct the configuration of your SRX Series device?
Exhibit You are not able to ping the default gateway of 192.168 100 1 (or your network that is located on your SRX Series firewall. Referring to the exhibit, which two commands would correct the configuration of your SRX Series device? (Choose two.) A) B) C) D) A . Option...
In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)
In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)A . Send a custom messageB . Close the connection.C . Drop the connection silently.D . Quarantine the host.View AnswerAnswer: B,D