Referring to the exhibit, which two devices are considered to be part of the secure fabric site with Policy Enforcer?
Click the Exhibit button. Referring to the exhibit, which two devices are considered to be part of the secure fabric site with Policy Enforcer? (Choose two.)A . Server-2B . SRX-1C . Server-1D . QFX-1View AnswerAnswer: B,D
You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?
Click the Exhibit button. You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: https://kb.juniper.net/InfoCenter/index?page=content&id=KB31080
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?A . Cluster nodes require an upgrade to HA compliant Routing Engines.B . Cluster nodes must be connected through a Layer 2 switch.C . There can be active/passive or active/active clusters.D . HA clusters must use...
The output shown in the exhibit is displayed in which format?
Click the Exhibit button. The output shown in the exhibit is displayed in which format?A . syslogB . sd-syslogC . binaryD . WELFView AnswerAnswer: A
Which statement about the control link in a chassis cluster is correct?
Which statement about the control link in a chassis cluster is correct?A . A cluster can have redundant control links.B . Recovering from a control link failure requires a reboot.C . The control link heartbeats contain the configuration file of the nodes.D . The control messages sent over the link...
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)A . SSL proxy supports TLS version 1.2.B . Client-protection is also known as reverse proxy.C . SSL proxy is supported when enabled within logical systems.D . SSL proxy relies on Active Directory to provide secure communication.View AnswerAnswer: A,C...
Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)
Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)A . vSRX provides Layer 2 to Layer 7 secure services and cSRX provides Layer 4 to Layer 7 secure services.B . cSRX requires less storage and memory space for a...
Which two parameters are required to accomplish this task?
You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic. Which two parameters are required to accomplish this task? (Choose two.)A . source IP addressB . destination IP addressC . destination portD . source portView...
Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)
Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)A . JIMS synchronizes Active Directory authentication information between a primary and secondary JIMS server.B . JIMS forwards Active Directory authentication information to SRX Series client devices.C . JIMS collects and maintains a database of authentication information from...
What are two valid JIMS event log sources? (Choose two.)
What are two valid JIMS event log sources? (Choose two.)A . Microsoft Windows Server 2012 audit logsB . Microsoft Active Directory server event logsC . Microsoft Exchange Server event logsD . Microsoft Active Directory audit logsView AnswerAnswer: B,C