Which statement about security policy schedulers is correct?
Which statement about security policy schedulers is correct?A . Multiple policies can use the same scheduler.B . A policy can have multiple schedulers.C . When the scheduler is disabled, the policy will still be available.D . A policy without a defined scheduler will not become activeView AnswerAnswer: A Explanation: Schedulers...
What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?
What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?A . certificatesB . dynamic address groupsC . MAC addressesD . domain namesView AnswerAnswer: D Explanation: Encrypted traffic insights (ETI) uses domain names to notify SRX Series devices about known malware sites. ETI is...
Which two actions would correct the error?
Exhibit You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to...
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)A . vQFXB . MXC . vMXD . QFXView AnswerAnswer: B C Explanation: The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time...
How does the SSL proxy detect if encryption is being used?
How does the SSL proxy detect if encryption is being used?A . It uses application identity services.B . It verifies the length of the packetC . It queries the client device.D . It looks at the destination port number.View AnswerAnswer: D Explanation: The SSL proxy can detect if encryption is...
Which feed will the clients IP address be automatically added to in this situation?
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold. Which feed will the clients IP address be automatically added to in this situation?A . the command-and-control cloud feedB . the allowlist and blocklist feedC . the custom cloud feedD ....
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)A . Web proxyB . client-protectionC . server-protectionD . DNS proxyView AnswerAnswer: B C Explanation: Based on SSL proxy is a feature that allows SRX Series devices to decrypt and inspect SSL/TLS traffic for security purposes. According...
In this scenario, what is the correct order for rebooting the devices?
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device. In this scenario, what is the correct order for rebooting the devices?A . Reboot the secondary device, then the primary device.B . Reboot only the secondary device since the primary will...
After JSA receives external events and flows, which two steps occur? (Choose two.)
After JSA receives external events and flows, which two steps occur? (Choose two.)A . After formatting the data, the data is stored in an asset database.B . Before formatting the data, the data is analyzed for relevant information.C . Before the information is filtered, the information is formattedD . After...
Regarding static attack object groups, which two statements are true? (Choose two.)
Regarding static attack object groups, which two statements are true? (Choose two.)A . Matching attack objects are automatically added to a custom group.B . Group membership automatically changes when Juniper updates the IPS signature database.C . Group membership does not automatically change when Juniper updates the IPS signature database.D ....