Which statements is correct about SKY ATP?

Which statements is correct about SKY ATP?A . Sky ATP is an open-source security solution.B . Sky ATP is used to automatically push out changes to the AppSecure suite.C . Sky ATP only support sending threat feeds to vSRX Series devicesD . Sky ATP is a cloud-based security threat analyzer...

April 29, 2022 No Comments READ MORE +

What must you do first to use the Monitor/Alarms/Policy Log workspace in J-Web?

What must you do first to use the Monitor/Alarms/Policy Log workspace in J-Web?A . You must enable logging that uses the SD-Syslog format.B . You must enable security logging that uses the TLS transport mode.C . You must enable stream mode security logging on the SRX Series device.D . You...

April 29, 2022 No Comments READ MORE +

What would be used to accomplish this task?

You want to automatically generate the encryption and authentication keys during IPsec VPN establishment. What would be used to accomplish this task?A . IPsecB . Diffie_HellmanC . Main modeD . Aggregate modeView AnswerAnswer: B

April 28, 2022 No Comments READ MORE +

Which two statements are true about the null zone? (Choose two.)

Which two statements are true about the null zone? (Choose two.)A . All interface belong to the bull zone by default.B . All traffic to the null zone is dropped.C . All traffic to the null zone is allowedD . The null zone is a user-defined zoneView AnswerAnswer: AB

April 28, 2022 No Comments READ MORE +

Why is this problem happening?

Referring to the exhibit. Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook. Why is this problem happening?A . Global rules are honored before zone-based rules.B . The internet-Access rule has a higher precedence valueC . The...

April 28, 2022 No Comments READ MORE +

Which statement is correct about IKE?

Which statement is correct about IKE?A . IKE phase 1 is used to establish the data pathB . IKE phase 1 only support aggressive mode.C . IKE phase 1 negotiates a secure channel between gateways.D . IKE phase 1 establishes the tunnel between devicesView AnswerAnswer: C

April 28, 2022 No Comments READ MORE +

Which protocol would satisfy these requirements?

You are configuring an IPsec VPN tunnel between two location on your network. Each packet must be encrypted and authenticated. Which protocol would satisfy these requirements?A . MD5B . ESPC . AHD . SHAView AnswerAnswer: B

April 27, 2022 No Comments READ MORE +

Which type of security policy protect restricted services from running on non-standard ports?

Which type of security policy protect restricted services from running on non-standard ports?A . Application firewallB . IDPC . Sky ATPD . antivirusView AnswerAnswer: B

April 26, 2022 No Comments READ MORE +

What are the valid actions for a source NAT rule in J-Web? (choose three.)

What are the valid actions for a source NAT rule in J-Web? (choose three.)A . OnB . OffC . PoolD . SourceE . interfaceView AnswerAnswer: BCE Explanation: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/nat-security-source-andsource-pool.html

April 26, 2022 No Comments READ MORE +

Which statements is correct about Junos security zones?

Which statements is correct about Junos security zones?A . User-defined security must contain at least one interface.B . Security policies are referenced within a user-defined security zone.C . Logical interface are added to user defined security zonesD . User-defined security must contains the key word ‘’zone’’View AnswerAnswer: C

April 26, 2022 No Comments READ MORE +