What are two types of system logs that Junos generates? (Choose two.)
What are two types of system logs that Junos generates? (Choose two.)A . SQL log filesB . data plane logsC . system core dump filesD . control plane logsView AnswerAnswer: B D Explanation: The two types of system logs that Junos generates are control plane logs and data plane logs....
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Which three statements about SRX Series device chassis clusters are true? (Choose three.)A . Chassis cluster control links must be configured using RFC 1918 IP addresses.B . Chassis cluster member devices synchronize configuration using the control link.C . A control link failure causes the secondary cluster node to be disabled.D...
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?A . JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.B . JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.C...
Referring to the exhibit, which two statements are true?
Exhibit Referring to the exhibit, which two statements are true? (Choose two.)A . Nancy logged in to the juniper.net Active Directory domain.B . The IP address of Nancy's client PC is 172.25.11.C . The IP address of the authenticating domain controller is 172.25.11.140.D . Nancy is a member of...
Which step is necessary to accomplish this task?
You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair. Which step is necessary to accomplish this task?A . Issue the set chassis cluster disable reboot command on the primary node.B . Implement the control link recover/ solution before adjusting the priorities.C ....
Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?
Exhibit Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?A . Forwarding LookupB . Services ALGsC . Security PolicyD . ScreensView AnswerAnswer: B
Which two statements about SRX Series device chassis clusters are true? (Choose two.)
Which two statements about SRX Series device chassis clusters are true? (Choose two.)A . Redundancy group 0 is only active on the cluster backup node.B . Each chassis cluster member requires a unique cluster ID value.C . Each chassis cluster member device can host active redundancy groupsD . Chassis cluster...
Referring to the exhibit which statement is true?
Exhibit Referring to the exhibit which statement is true?A . SSL proxy functions will ignore the session.B . SSL proxy leverages post-match results.C . SSL proxy must wait for return traffic for the final match to occur.D . SSL proxy leverages pre-match resultView AnswerAnswer: D
Which two statements are correct about SSL proxy server protection? (Choose two.)
Which two statements are correct about SSL proxy server protection? (Choose two.)A . You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.B . You must load the server certificates on the SRX Series device.C . The servers must be...
Which two statements are correct about the configuration shown in the exhibit?
Exhibit Which two statements are correct about the configuration shown in the exhibit? (Choose two.)A . The session-class parameter in only used when troubleshooting.B . The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.C . Every session that enters the SRX Series device will generate...