In this scenario, which two statements are true?
You are scanning files that are being transferred from the Internet to hosts on your internal network with Sky ATP. However, you notice that files that are 1 GB in size are not being scanned by Sky ATP. In this scenario, which two statements are true? (Choose two.)A . The...
Which AppSecure feature identifies applications that are present in traffic?
Which AppSecure feature identifies applications that are present in traffic?A . AppIDB . AppTrackC . AppFWD . AppQoSView AnswerAnswer: A
In this scenario, which technology would you use to secure all Layer 2 and Layer 3 traffic between racks?
You have been notified by your colocation provider that your infrastructure racks will no longer be adjacent to each other. In this scenario, which technology would you use to secure all Layer 2 and Layer 3 traffic between racks?A . IPsecB . GREC . 802.1BRD . MACsecView AnswerAnswer: D
Referring to the exhibit, which two statements are true?
Click the Exhibit button. Referring to the exhibit, which two statements are true? (Choose two.)A . You can secure inter-VLAN traffic with a security policy on this device.B . You can secure intra-VLAN traffic with a security policy on this device.C . The device can pass Layer 2 and Layer...
What must you do to solve the problem?
Click the Exhibit button. You are trying to implement secure wire on your SRX Series device. However, you are receiving the commit error shown in the exhibit. What must you do to solve the problem?A . Add the correct logical units to the interfaces in the secure wire.B . Put...
Using the Policy Controller API, which configuration would post Sky ATP with PE mode to the Policy Enforcer controller configuration?
Using the Policy Controller API, which configuration would post Sky ATP with PE mode to the Policy Enforcer controller configuration?A . “configs”: {“sdsn”: false“cloudonly”: true}B . “configs”: {“sdsn”: false“cloud”: false}C . “configs”: {“sdsn”: true“cloudonly”: false}D . “configs”: {“sdsn”: false“cloud”: true}View AnswerAnswer: C
In this scenario, which statement is true?
You are using IDP on your SRX Series device and are asked to ensure that the SRX Series device has the latest IDP database, as well as the latest application signature database. In this scenario, which statement is true?A . The application signature database cannot be updated on a device...
In this scenario, which two commands would you use to meet this requirement?
You need to add all of the sites in the domain example.com to urllist2. You decide to use wildcards to account for any changes made to the domain in the future. In this scenario, which two commands would you use to meet this requirement? (Choose two.)A . set custom-objects url-pattern...
Which configuration accomplishes these objectives?
You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restarted to the VLANs from which they originate. Which configuration accomplishes these objectives?A . bridge {block-non-ip-all;bpdu-vlan-flooding;}B . bridge {block-non-ip-all;bypass-non-ip-unicast;no-packet-flooding;}C . bridge {bypass-non-ip-unicast;bpdu-vlan-flooding;}D . bridge {block-non-ip-all;bypass-non-ip-unicast;bpdu-vlan-flooding;}View AnswerAnswer: A
Using only Security Director, how do you find the rule that is allowing the communication to occur in this scenario?
After using Security Director to add a new firewall policy rule on an SRX Series device, you notice that the hit count on the policy is not increasing. Upon further investigation, you find that the devices listed in the new rule are able to communicate as expected. Your firewall policy...