Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)
Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)A . DNS B. Microsoft Exchange Server event logs C. OpenLDAP service ports D. Active Directory domain controller event logsView AnswerAnswer: CD
Using the information from the exhibit, which statement is correct?
Click the Exhibit button. Using the information from the exhibit, which statement is correct?A . Redundancy group 1 is in an ineligible state. B. Node 1 is the active node for the control plane C. Redundancy group 0 is in an ineligible state. D. There are no issues with the...
How do you solve this problem?
Click the Exhibit button. You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit. How do you solve this problem?A . Reboot the SRX Series device B. Import the existing certificate to each client device C. Install a new SRX Series device to act...
Which two statements are correct about SSL proxy server protection? (Choose two)
Which two statements are correct about SSL proxy server protection? (Choose two)A . You do not need to configure the servers to use the SSL proxy function on the SRX Series device. B. You must load the server certificates on the SRX Series device. C. The servers must be configured...
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)
Which two statements are true about the fab interface in a chassis cluster? (Choose two.)A . The Junos OS supports only one fab link. B. The fab link does not support fragmentation C. The fab link supports traditional interface features D. The physical interface for the fab link must be...
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)A . DNS proxy B. client-protection C. server-protection D. Web ProxyView AnswerAnswer: AD
In this scenario, which two application security features should be used?
You are asked to block malicious applications regardless of the port number being used In this scenario, which two application security features should be used? (Choose two)A . AppTrack B. AppFW C. AppQoE D. APPIDView AnswerAnswer: AE
Which two statements are correct about Aup Track? (Choose two)
Which two statements are correct about Aup Track? (Choose two)A . AppTrack can only be configured in the main logical system on an SRX Series device B. AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used C. AppTrack collects traffic flow information including...
Referring to the exhibit, which two statements describe the type of proxy used?
Click the Exhibit button Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)A . forward proxy B. server protection proxy C. reverse proxy D. client protection ProxyView AnswerAnswer: AC
Which statement is correct in this scenario?
Click the Exhibit button. You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the them. Which statement is correct in this scenario?A . Set the maximum C&C entries within the Juniper ATP Cloud GUİ. B. No action is required, the feeds...