Which command will return this information?
You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud Which command will return this information?A . show security dynamic―address category―name CC...
In this scenario, which port should be opened in the firewall device?
You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?A . 8080B . 443C . 80D . 22View AnswerAnswer: B
How many IKE security associations are required between the IPsec peers in this scenario?
Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?A . 1B . 3C . 4D . 2View AnswerAnswer: A
Referring to the exhibit, what is a reason for this behavior?
Exhibit You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated. Referring to the exhibit, what is a reason for this behavior?A...
Which two steps will fulfill this requirement?
You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)A . Enroll the devices with Juniper ATP Appliance.B . Enroll the devices with Juniper ATP Cloud.C . Enable a third-party...
You are connecting two remote sites to your corporate headquarters site.You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?
You are connecting two remote sites to your corporate headquarters site.You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?A . IPsec ADVPNB . hub-and-spoke IPsec VPNC . Layer 2 VPND . full mesh Layer 3 VPN with EBGPView...
In this scenario, which solution would you choose?
You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain. In this scenario, which solution would you choose?A . VRF instancesB . virtual router instancesC...
Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?
Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?A . The number of traffic selectors configured for the VPN.B . The number of CoS queues configured for the VPN.C . The number of classifiers configured for the VPN.D . The number of...
Which three profiles are configurable in this scenario?
You want to configure a threat prevention policy. Which three profiles are configurable in this scenario? (Choose three.)A . device profileB . SSL proxy profileC . infected host profileD . C&C profileE . malware profileView AnswerAnswer: A D E
Which statement is true about persistent NAT types?
Which statement is true about persistent NAT types?A . The target-host-port parameter cannot be used with IPv4 addresses in NAT46.B . The target-host parameter cannot be used with IPv6 addressee in NAT64.C . The target-host parameter cannot be used with IPv4 addresses inNAT46D . The target-host-port parameter cannot be used...