Which type of security policy protect restricted services from running on non-standard ports?

Which type of security policy protect restricted services from running on non-standard ports?A . Application firewallB . IDPC . Sky ATPD . antivirusView AnswerAnswer: B

August 1, 2020 No Comments READ MORE +

what should you do to solve this problem?

Referring to the exhibit. Users should not have access to Facebook, however, a recent examination of the logs security show that users are accessing Facebook. what should you do to solve this problem?A . Change the source address for the Block-Facebook-Access rule to the prefix of the usersB . Move...

August 1, 2020 No Comments READ MORE +

What would be used to accomplish this task?

You want to automatically generate the encryption and authentication keys during IPsec VPN establishment. What would be used to accomplish this task?A . IPsecB . Diffie_HellmanC . Main modeD . Aggregate modeView AnswerAnswer: B

July 31, 2020 No Comments READ MORE +

What are the valid actions for a source NAT rule in J-Web? (choose three.)

What are the valid actions for a source NAT rule in J-Web? (choose three.)A . OnB . OffC . PoolD . SourceE . interfaceView AnswerAnswer: BCE Explanation: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/nat-security-source-andsource-pool.html

July 31, 2020 No Comments READ MORE +

Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)

Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)A . Destination zoneB . Destination interfaceC . Source interfaceD . Source zoneView AnswerAnswer: BD

July 31, 2020 No Comments READ MORE +

Which two segments describes IPsec VPNs? (Choose two.)

Which two segments describes IPsec VPNs? (Choose two.)A . IPsec VPN traffic is always authenticated.B . IPsec VPN traffic is always encrypted.C . IPsec VPNs use security to secure traffic over a public network between two remote sites.D . IPsec VPNs are dedicated physical connections between two private networks.View AnswerAnswer:...

July 30, 2020 No Comments READ MORE +

Why is this problem happening?

Referring to the exhibit. Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook. Why is this problem happening?A . Global rules are honored before zone-based rules.B . The internet-Access rule has a higher precedence valueC . The...

July 29, 2020 No Comments READ MORE +

On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office-using a dynamic IP address?

On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office-using a dynamic IP address?A . Configure the IPsec policy to use MDS authentication.B . Configure the IKE policy to use aggressive mode.C . Configure the IPsec policy to use aggressive...

July 29, 2020 No Comments READ MORE +

In this scenario, what do you configure to accomplish this task?

On an SRX device, you want to regulate traffic base on network segments. In this scenario, what do you configure to accomplish this task?A . ScreensB . ZonesC . ALGsD . NATView AnswerAnswer: B

July 29, 2020 No Comments READ MORE +

BY default, revenue interface are placed into which system-defined security zone on an SRX series device?

BY default, revenue interface are placed into which system-defined security zone on an SRX series device?A . TrustB . NullC . Junos-trustD . untrustView AnswerAnswer: D

July 28, 2020 No Comments READ MORE +