Which two statements are correct about using global-based policies over zone-based policies? (Choose two.)

Which two statements are correct about using global-based policies over zone-based policies? (Choose two.)A . With global-based policies, you do not need to specify a destination zone in the match criteria.B . With global-based policies, you do not need to specify a source zone in the match criteria.C . With...

July 27, 2020 No Comments READ MORE +

Which protocol would satisfy these requirements?

You are configuring an IPsec VPN tunnel between two location on your network. Each packet must be encrypted and authenticated. Which protocol would satisfy these requirements?A . MD5B . ESPC . AHD . SHAView AnswerAnswer: B

July 27, 2020 No Comments READ MORE +

What should you configure if you want to translate private source IP address to a single public IP address?

What should you configure if you want to translate private source IP address to a single public IP address?A . Source NATB . Destination NATC . Content filteringD . Security DirectorView AnswerAnswer: A

July 26, 2020 No Comments READ MORE +

Which statements is correct about SKY ATP?

Which statements is correct about SKY ATP?A . Sky ATP is an open-source security solution.B . Sky ATP is used to automatically push out changes to the AppSecure suite.C . Sky ATP only support sending threat feeds to vSRX Series devicesD . Sky ATP is a cloud-based security threat analyzer...

July 25, 2020 No Comments READ MORE +

What is the first action to accomplish task?

You want to integrate an SRX Series device with SKY ATP. What is the first action to accomplish task?A . Issue the commit script to register the SRX Series device.B . Copy the operational script from the Sky ATP Web UD . Create an account with the Sky ATP Web...

July 25, 2020 No Comments READ MORE +

What are two reasons for this access failure?

You have created a zones-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so. What are two reasons for this...

July 25, 2020 No Comments READ MORE +

Which two statements are true about the null zone? (Choose two.)

Which two statements are true about the null zone? (Choose two.)A . All interface belong to the bull zone by default.B . All traffic to the null zone is dropped.C . All traffic to the null zone is allowedD . The null zone is a user-defined zoneView AnswerAnswer: AB

July 25, 2020 No Comments READ MORE +

Which statement is correct regarding the interface configuration shown in the exhibit?

Exhibit. Which statement is correct regarding the interface configuration shown in the exhibit?A . The interface MTU has been increased.B . The IP address has an invalid subnet mask.C . The IP address is assigned to unit 0.D . The interface is assigned to the trust zone by default.View AnswerAnswer:...

July 24, 2020 No Comments READ MORE +

What must you do first to use the Monitor/Alarms/Policy Log workspace in J-Web?

What must you do first to use the Monitor/Alarms/Policy Log workspace in J-Web?A . You must enable logging that uses the SD-Syslog format.B . You must enable security logging that uses the TLS transport mode.C . You must enable stream mode security logging on the SRX Series device.D . You...

July 24, 2020 No Comments READ MORE +

Which statement about IPsec is correct?

Which statement about IPsec is correct?A . IPsec can provide encryption but not data integrity.B . IPsec support packet fragmentation by intermediary devices.C . IPsec support both tunnel and transport modes.D . IPsec must use certificates to provide data encryptionView AnswerAnswer: C

July 24, 2020 No Comments READ MORE +