Which module in the AppSecure suite will help in this task?
You want to use IPS signatures to monitor traffic. Which module in the AppSecure suite will help in this task?A . AppTrack B. AppQoS C. AppFW D. APPIDView AnswerAnswer: C Explanation: The AppFW module in the AppSecure suite provides IPS signatures that can be used to monitor traffic and detect...
In this scenario, which two statements are correct?
You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows. In this scenario, which two statements are correct? (Choose two.)A . The early-ageout configuration specifies the timeout value, in...
What are two benefits of using a vSRX in a software-defined network? (Choose two.)
What are two benefits of using a vSRX in a software-defined network? (Choose two.)A . scalability B. no required software license C. granular security D. infinite number of interfacesView AnswerAnswer: A C Explanation: - Scalability: vSRX instances can be easily added or removed as the needs of the network change,...
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)A . vQFX B. MX C. vMX D. QFXView AnswerAnswer: B C Explanation: The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time...
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)A . The fab link does not support fragmentation. B. The physical interface for the fab link must be specified in the configuration. C. The fab link supports traditional interface features. D. The Junos OS supports...
Referring to the exhibit which statement is true?
Exhibit Referring to the exhibit which statement is true?A . SSL proxy functions will ignore the session. B. SSL proxy leverages post-match results. C. SSL proxy must wait for return traffic for the final match to occur. D. SSL proxy leverages pre-match resultView AnswerAnswer: D
In this scenario, what is the correct order for rebooting the devices?
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device. In this scenario, what is the correct order for rebooting the devices?A . Reboot the secondary device, then the primary device. B. Reboot only the secondary device since the primary will...
Which two actions would correct the error?
Exhibit You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to...
What are two reasons for this error?
Exhibit When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)A . The SSL proxy certificate ID is part of a blocklist. B. The SSL proxy certificate ID does not have the correct renegotiation option set....
Which action should you take in this situation?
You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?A . Connect JIMS to the RADIUS server B. Connect JIMS to the domain Exchange server C. Connect JIMS to the domain SQL server. D. Connect JIMS to another...