Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)

Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP address (Choose two.)A . DNS B. Microsoft Exchange Server event logs C. OpenLDAP service ports D. Active Directory domain controller event logsView AnswerAnswer: CD

March 4, 2023No CommentsREAD MORE +

Using the information from the exhibit, which statement is correct?

Click the Exhibit button. Using the information from the exhibit, which statement is correct?A . Redundancy group 1 is in an ineligible state. B. Node 1 is the active node for the control plane C. Redundancy group 0 is in an ineligible state. D. There are no issues with the...

March 4, 2023No CommentsREAD MORE +

How do you solve this problem?

Click the Exhibit button. You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit. How do you solve this problem?A . Reboot the SRX Series device B. Import the existing certificate to each client device C. Install a new SRX Series device to act...

March 2, 2023No CommentsREAD MORE +

Which two statements are correct about SSL proxy server protection? (Choose two)

Which two statements are correct about SSL proxy server protection? (Choose two)A . You do not need to configure the servers to use the SSL proxy function on the SRX Series device. B. You must load the server certificates on the SRX Series device. C. The servers must be configured...

March 1, 2023No CommentsREAD MORE +

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)A . The Junos OS supports only one fab link. B. The fab link does not support fragmentation C. The fab link supports traditional interface features D. The physical interface for the fab link must be...

February 25, 2023No CommentsREAD MORE +

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)A . DNS proxy B. client-protection C. server-protection D. Web ProxyView AnswerAnswer: AD

February 25, 2023No CommentsREAD MORE +

In this scenario, which two application security features should be used?

You are asked to block malicious applications regardless of the port number being used In this scenario, which two application security features should be used? (Choose two)A . AppTrack B. AppFW C. AppQoE D. APPIDView AnswerAnswer: AE

February 25, 2023No CommentsREAD MORE +

Which two statements are correct about Aup Track? (Choose two)

Which two statements are correct about Aup Track? (Choose two)A . AppTrack can only be configured in the main logical system on an SRX Series device B. AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used C. AppTrack collects traffic flow information including...

February 24, 2023No CommentsREAD MORE +

Referring to the exhibit, which two statements describe the type of proxy used?

Click the Exhibit button Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)A . forward proxy B. server protection proxy C. reverse proxy D. client protection ProxyView AnswerAnswer: AC

February 24, 2023No CommentsREAD MORE +

Which statement is correct in this scenario?

Click the Exhibit button. You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the them. Which statement is correct in this scenario?A . Set the maximum C&C entries within the Juniper ATP Cloud GUİ. B. No action is required, the feeds...

February 24, 2023No CommentsREAD MORE +