How does the SSL proxy detect if encryption is being used?

How does the SSL proxy detect if encryption is being used?A . It uses application identity services.B . It verifies the length of the packetC . It queries the client device.D . It looks at the destination port number.View AnswerAnswer: D Explanation: The SSL proxy can detect if encryption is...

February 3, 2025 No Comments READ MORE +

Referring to the exhibit, which two statements are true?

Exhibit Referring to the exhibit, which two statements are true? (Choose two.)A . Nancy logged in to the juniper.net Active Directory domain.B . The IP address of Nancy's client PC is 172.25.11.C . The IP address of the authenticating domain controller is 172.25.11.140.D .   Nancy is a member of...

January 29, 2025 No Comments READ MORE +

Which two statements are correct in this scenario about the control-link settings?

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering. Which two statements are correct in this scenario about the control-link settings? (Choose two.)A . In the vSwitch security settings, accept promiscuous mode.B . In the vSwitch properties...

January 27, 2025 No Comments READ MORE +

Which two statements are true about the vSRX? (Choose two.)

Which two statements are true about the vSRX? (Choose two.)A . It does not have VMXNET3 vNIC support.B . It has VMXNET3 vNIC support.C . UNIX is the base OS.D . Linux is the base OS.View AnswerAnswer: B D

January 25, 2025 No Comments READ MORE +

Which statement about security policy schedulers is correct?

Which statement about security policy schedulers is correct?A . Multiple policies can use the same scheduler.B . A policy can have multiple schedulers.C . When the scheduler is disabled, the policy will still be available.D . A policy without a defined scheduler will not become activeView AnswerAnswer: A Explanation: Schedulers...

January 23, 2025 No Comments READ MORE +

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)A . The fab link does not support fragmentation.B . The physical interface for the fab link must be specified in the configuration.C . The fab link supports traditional interface features.D . The Junos OS supports...

January 21, 2025 No Comments READ MORE +

Which statement about security policy schedulers is correct?

Which statement about security policy schedulers is correct?A . Multiple policies can use the same scheduler.B . A policy can have multiple schedulers.C . When the scheduler is disabled, the policy will still be available.D . A policy without a defined scheduler will not become activeView AnswerAnswer: A Explanation: Schedulers...

December 5, 2023 No Comments READ MORE +

What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?

What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?A . certificatesB . dynamic address groupsC . MAC addressesD . domain namesView AnswerAnswer: D Explanation: Encrypted traffic insights (ETI) uses domain names to notify SRX Series devices about known malware sites. ETI is...

December 4, 2023 No Comments READ MORE +

Which two actions would correct the error?

Exhibit You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to...

December 4, 2023 No Comments READ MORE +

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)A . vQFXB . MXC . vMXD . QFXView AnswerAnswer: B C Explanation: The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time...

December 3, 2023 No Comments READ MORE +