Which feature is enabled with destination NAT as shown in the exhibit?

Click the Exhibit button. Which feature is enabled with destination NAT as shown in the exhibit?A . NAT overloadB . block allocationC . port translationD . NAT hairprintingView AnswerAnswer: C

June 17, 2019 No Comments READ MORE +

Which statement is true about functional zones?

Which statement is true about functional zones?A . Functional zones are a collection of regulated transit network segments.B . Functional zones provide a means of distinguishing groups of hosts and their resources from oneanother.C . Functional zones are used for management.D . Functional zones are the building blocks for security...

June 11, 2019 No Comments READ MORE +

Which three statements describes traditional firewalls? (Choose three.)

Which three statements describes traditional firewalls? (Choose three.)A . A traditional firewall performs stateless packet processing.B . A traditional firewall offers encapsulation, authentication, and encryption.C . A traditional firewall performs stateful packet processing.D . A traditional firewall forwards all traffic by default.E . A traditional firewall performs NAT and PAView...

June 7, 2019 No Comments READ MORE +

Which statement describes the function of NAT?

Which statement describes the function of NAT?A . NAT encrypts transit traffic in a tunnel.B . NAT detects various attacks on traffic entering a security device.C . NAT translates a public address to a private address.D . NAT restricts or permits users individually or ina group.View AnswerAnswer: C

June 5, 2019 No Comments READ MORE +

Which statement describes the function of screen options?

Which statement describes the function of screen options?A . Screen options encrypt transit traffic in a tunnel.B . Screen options protect against various attacks on traffic entering a security device.C . Screen options translate a private address to a public address.D . Screen options restrict or permit users individually or...

June 4, 2019 No Comments READ MORE +

Which three Encapsulating Security Payload protocols do the SRX Series devices support with IPsec? (Choose three.)

Which three Encapsulating Security Payload protocols do the SRX Series devices support with IPsec? (Choose three.)A . DESB . RC6C . TLSD . AESE . 3DESView AnswerAnswer: A,D,E

June 1, 2019 No Comments READ MORE +

What is the function of redundancy group 0 in a chassis cluster?

What is the function of redundancy group 0 in a chassis cluster?A . Redundancy group 0 identifies the node controlling the cluster management interface IP addresses.B . The primary node for redundancy group 0 identifies the first member node in a chassis cluster.C . The primary node for redundancy group...

May 29, 2019 No Comments READ MORE +

Referring to the exhibit, what will happen if client 172.16.128.50 tries to connect to destination 192.168.150.111 using HTTP?

Click the Exhibit button. Referring to the exhibit, what will happen if client 172.16.128.50 tries to connect to destination 192.168.150.111 using HTTP?A . The client will be denied by policy p2.B . The client will be denied by policy p1.C . The client will be permitted by policy p2.D ....

May 28, 2019 No Comments READ MORE +

Which NAT parameter would meet this requirement?

You have configured source NAT with port address translation. You also need to guarantee that the same IP address is assigned from the source NAT pool to a specific host for multiple concurrent sessions. Which NAT parameter would meet this requirement?A . port block-allocationB . port range twin-portC . address-persistentD...

May 27, 2019 No Comments READ MORE +

Which two statements about security policy actions are true? (Choose two.)

Which two statements about security policy actions are true? (Choose two.)A . The log action implies an accept action.B . The log action requires an additional terminating action.C . The countaction implies an accept action.D . The count action requires an additional terminating action.View AnswerAnswer: B,D

May 27, 2019 No Comments READ MORE +