When designing the security for a service provider core router, you are asked to add a firewall fitter on the to0 interface in this scenario, which two protocols would you want to allow through the filter? (Choose two.)
When designing the security for a service provider core router, you are asked to add a firewall fitter on the to0 interface in this scenario, which two protocols would you want to allow through the filter? (Choose two.)A . LLDPB . SSHC . BGPD . STPView AnswerAnswer: A,C
Which solution will accomplish this task?
You must implement a solution to deploy end-to-end security services on network elements. Which solution will accomplish this task?A . Security DirectorB . Network DirectorC . JSAD . SRX Series devicesView AnswerAnswer: C
Which statement about Junos firewall filters is correct?
Which statement about Junos firewall filters is correct?A . Firewall filters can be applied as a security policy actionB . Firewall filters do not operate on stateful flows and they serve no purpose in a next-generation firewallC . Firewall filters can be applied as the packet enters the security device,...
Which solution would you deploy to accomplish this task?
Which solution would you deploy to accomplish this task?A . Junes Space Log DirectorB . Juniper Networks Central insightsC . Junos Space Security DirectorD . Juniper Networks Secure AnalyticsView AnswerAnswer: A
Which firewall deployment method satisfies this requirement?
You are designing a security solution for an existing data center. All traffic most be secured using SRX Series devices, however, you are unable to change the existing IP addressing scheme. Which firewall deployment method satisfies this requirement?A . transparent deploymentB . two-arm deploymentC . one-arm deploymentD . inline deploymentView...
In this scenario. which two dements must be part of the design?
You are designing a security solution that includes SRX Series firewalls in a chassis cluster. In this scenario. which two dements must be part of the design? (Choose two.)A . The physical interface on each SRX Series device making up the reth interface must be in the same L2 domainB...
Which two statements are true about WAN security considerations? (Choose two.)
Which two statements are true about WAN security considerations? (Choose two.)A . MACsec increases protection on alt WAN typesB . Provider VPN circuit require iPsecC . internal connections are susceptible to fragmentationD . IPsec increases protection on all WAN typesView AnswerAnswer: C
You want to reduce the possibility of your data center's server becoming an unwilling participant in a DDoS attack When tvA3 features should you use on your SRX Series devices to satisfy this requirement? (Choose two.)
You want to reduce the possibility of your data center's server becoming an unwilling participant in a DDoS attack When tvA3 features should you use on your SRX Series devices to satisfy this requirement? (Choose two.)A . dynamic IPsec tunnelsB . Juniper ATP Cloud GeolPC . UTMWebtaeringD . Juniper ATP...
When using Contra! networking, security policies are distributed as access control list to which component?
When using Contra! networking, security policies are distributed as access control list to which component?A . vSwithB . vSRXC . vMXD . vRouterView AnswerAnswer: D
According to Juniper Networks, what are two focus points when designing a secure network? (Choose two.)
According to Juniper Networks, what are two focus points when designing a secure network? (Choose two.)A . performanceB . automationC . distributed controlD . classificationView AnswerAnswer: A,D