What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?
What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?A . certificatesB . dynamic address groupsC . MAC addressesD . domain namesView AnswerAnswer: D Explanation: Encrypted traffic insights (ETI) uses domain names to notify SRX Series devices about known malware sites. ETI is...
In this scenario, which two statements are correct?
You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows. In this scenario, which two statements are correct? (Choose two.)A . The early-ageout configuration specifies the timeout value, in...
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?A . The active sessions allowed by the policy will be dropped.B . The active sessions allowed by the policy will be marked as a legacy flow and will continue...
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)A . vQFXB . MXC . vMXD . QFXView AnswerAnswer: B C Explanation: The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time...
Using the information from the exhibit, which statement is correct?
Exhibit Using the information from the exhibit, which statement is correct?A . Redundancy group 1 is in an ineligible state.B . Node1 is the active node for the control planeC . There are no issues with the cluster.D . Redundancy group 0 is in an ineligible state.View AnswerAnswer: C
Which Juniper Networks solution will accomplish this task?
You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection. Which Juniper Networks solution will accomplish this task?A . JIMSB . Encrypted Traffic InsightsC . UTMD ....
Which two statements about SRX Series device chassis clusters are true? (Choose two.)
Which two statements about SRX Series device chassis clusters are true? (Choose two.)A . Redundancy group 0 is only active on the cluster backup node.B . Each chassis cluster member requires a unique cluster ID value.C . Each chassis cluster member device can host active redundancy groupsD . Chassis cluster...
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Which three statements about SRX Series device chassis clusters are true? (Choose three.)A . Chassis cluster control links must be configured using RFC 1918 IP addresses.B . Chassis cluster member devices synchronize configuration using the control link.C . A control link failure causes the secondary cluster node to be disabled.D...
After JSA receives external events and flows, which two steps occur? (Choose two.)
After JSA receives external events and flows, which two steps occur? (Choose two.) A. After formatting the data, the data is stored in an asset database. B. Before formatting the data, the data is analyzed for relevant information. C. Before the information is filtered, the information is formatted D. After...
Referring to the exhibit which statement is true?
Exhibit Referring to the exhibit which statement is true?A . SSL proxy functions will ignore the session.B . SSL proxy leverages post-match results.C . SSL proxy must wait for return traffic for the final match to occur.D . SSL proxy leverages pre-match resultView AnswerAnswer: C