In this scenario, which two statements are correct?
You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows. In this scenario, which two statements are correct? (Choose two.)A . The early-ageout configuration specifies the timeout value, in...
Which Juniper Networks solution will accomplish this task?
You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection. Which Juniper Networks solution will accomplish this task?A . JIMSB . Encrypted Traffic InsightsC . UTMD ....
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?A . The active sessions allowed by the policy will be dropped.B . The active sessions allowed by the policy will be marked as a legacy flow and will continue...
What are two reasons for this error?
Exhibit When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)A . The SSL proxy certificate ID is part of a blocklist.B . The SSL proxy certificate ID does not have the correct renegotiation option set.C...
What are three capabilities of AppQoS? (Choose three.)
What are three capabilities of AppQoS? (Choose three.)A . re-write DSCP valuesB . assign a forwarding classC . re-write the TTLD . rate-limit trafficE . reserve bandwidthView AnswerAnswer: A B E Explanation: AppQoS (Application Quality of Service) is a Junos OS feature that provides advanced control and prioritization of application...
What are two types of system logs that Junos generates? (Choose two.)
What are two types of system logs that Junos generates? (Choose two.)A . SQL log files B. data plane logs C. system core dump files D. control plane logsView AnswerAnswer: B D Explanation: The two types of system logs that Junos generates are control plane logs and data plane logs....
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)A . vQFX B. MX C. vMX D. QFXView AnswerAnswer: B C Explanation: The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time...
What are two benefits of using a vSRX in a software-defined network? (Choose two.)
What are two benefits of using a vSRX in a software-defined network? (Choose two.)A . scalability B. no required software license C. granular security D. infinite number of interfacesView AnswerAnswer: A C Explanation: - Scalability: vSRX instances can be easily added or removed as the needs of the network change,...
In this scenario, what is the correct order for rebooting the devices?
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device. In this scenario, what is the correct order for rebooting the devices?A . Reboot the secondary device, then the primary device. B. Reboot only the secondary device since the primary will...
Which two statements are correct in this scenario about the control-link settings?
You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering. Which two statements are correct in this scenario about the control-link settings? (Choose two.)A . In the vSwitch security settings, accept promiscuous mode. B. In the vSwitch properties...