Which default protocol and port are used for JIMS to SRX client communication?

Which default protocol and port are used for JIMS to SRX client communication?A . WMI over TCP; port 389B . ADSI over TCP; port 389C . HTTPS over TCP: port 443D . RPC over TCP, port 135View AnswerAnswer: C Explanation: Reference: https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-certificate-configuring.html#:~:text=By%20default%2C%20the%20HTTPS%20port%20is%20443.&text=The%20JIMS%20server%20communicates%20with,Firewall%20to%20allow%20this%20communication

March 7, 2021 No Comments READ MORE +

Which two statements are true in this scenario?

Click the Exhibit button. You examine the log file shown in the exhibit after running the set security idp active-policy command. Which two statements are true in this scenario? (Choose two.)A . The IDP policy compiled successfully.B . The IDP policy loaded successfully.C . The IDP hit cache is set...

March 7, 2021 No Comments READ MORE +

Which solution should you use if you want to detect known attacks using signature-based methods?

Which solution should you use if you want to detect known attacks using signature-based methods?A . SSL proxyB . JIMSC . IPSD . ALGsView AnswerAnswer: C

March 7, 2021 No Comments READ MORE +

Which action must you perform to eliminate the warning message?

Click the Exhibit button. You have implemented SSL proxy client protection. After implementing this feature, your users are complaining about the warning message shown in the exhibit. Which action must you perform to eliminate the warning message?A . Configure the SRX Series device as a trusted site in the client...

March 6, 2021 No Comments READ MORE +

Which two statements are true about the configuration shown in the exhibit?

Click the Exhibit button. Which two statements are true about the configuration shown in the exhibit? (Choose two.)A . The session is removed from the session table after 10 seconds of inactivity.B . The session is removed from the session table after 10 milliseconds of inactivity.C . Aggressive aging is...

March 6, 2021 No Comments READ MORE +

What is the default timeout period for a TCP session in the session table of a Junos security device?

What is the default timeout period for a TCP session in the session table of a Junos security device?A . 1 minuteB . 60 minutesC . 15 minutesD . 30 minutesView AnswerAnswer: D

March 6, 2021 No Comments READ MORE +

How many nodes are configurable in a chassis cluster using SRX Series devices?

How many nodes are configurable in a chassis cluster using SRX Series devices?A . 2B . 4C . 6D . 8View AnswerAnswer: A

March 5, 2021 No Comments READ MORE +

Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)

Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)A . Sky ATPB . UTMC . JATPD . IPSView AnswerAnswer: A,C

March 4, 2021 No Comments READ MORE +

Which feature should you implement to satisfy this requirement?

You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers. Which feature should you implement to satisfy this requirement?A . SSL proxyB . AppSecureC . JIMSD . JATPView AnswerAnswer: A

March 4, 2021 No Comments READ MORE +

Which statement describes the AppTrack module in AppSecure?

Which statement describes the AppTrack module in AppSecure?A . The AppTrack module provides enforcement with the ability to block traffic, based on specific applications.B . The AppTrack module provides control by the routing of traffic, based on the application.C . The AppTrack module identifies the applications that are present in...

March 3, 2021 No Comments READ MORE +