Click the Exhibit button.
Referring to the exhibit, which two devices are considered to be part of the secure fabric site with Policy Enforcer? (Choose two.)
A . Server-2
B . SRX-1
C . Server-1
D . QFX-1
Answer: B,D
Click the Exhibit button.
Referring to the exhibit, which two devices are considered to be part of the secure fabric site with Policy Enforcer? (Choose two.)
A . Server-2
B . SRX-1
C . Server-1
D . QFX-1
Answer: B,D
Click the Exhibit button.
You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?
A)
B)
C)
D)
A . Option A
B . Option B
C . Option C
D . Option D
Answer: C
Explanation:
https://kb.juniper.net/InfoCenter/index?page=content&id=KB31080
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
A . Cluster nodes require an upgrade to HA compliant Routing Engines.
B . Cluster nodes must be connected through a Layer 2 switch.
C . There can be active/passive or active/active clusters.
D . HA clusters must use NAT to prevent overlapping subnets between the nodes.
Answer: C
Click the Exhibit button.
The output shown in the exhibit is displayed in which format?
A . syslog
B . sd-syslog
C . binary
D . WELF
Answer: A
Which statement about the control link in a chassis cluster is correct?
A . A cluster can have redundant control links.
B . Recovering from a control link failure requires a reboot.
C . The control link heartbeats contain the configuration file of the nodes.
D . The control messages sent over the link are encrypted by default.
Answer: A
Explanation:
Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-dual-control-links.html
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
A . SSL proxy supports TLS version 1.2.
B . Client-protection is also known as reverse proxy.
C . SSL proxy is supported when enabled within logical systems.
D . SSL proxy relies on Active Directory to provide secure communication.
Answer: A,C
Explanation:
Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-ssl-tls.html
Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)
A . vSRX provides Layer 2 to Layer 7 secure services and cSRX provides Layer 4 to Layer 7 secure services.
B . cSRX requires less storage and memory space for a given deployment than vSRX-based solutions.
C . cSRX-based solutions are more scalable than vSRX-based solutions.
D . vSRX and cSRX both provide Layer 2 to Layer 7 secure services.
E . vSRX provides faster deployment time and faster reboots compared to cSR
Answer: A,B,C
Explanation:
Reference: https://www.juniper.net/documentation/en_US/day-one-books/topics/concept/juniper-vsrx-versus-csrx.html
You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic.
Which two parameters are required to accomplish this task? (Choose two.)
A . source IP address
B . destination IP address
C . destination port
D . source port
Answer: A,B
Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)
A . JIMS synchronizes Active Directory authentication information between a primary and secondary JIMS server.
B . JIMS forwards Active Directory authentication information to SRX Series client devices.
C . JIMS collects and maintains a database of authentication information from Active Directory domains.
D . JIMS replicates Active Directory authentication information to non-trusted Active Directory domain controllers.
Answer: A,C
Explanation:
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/services-user-identification-identity-management-connection-primary.html
What are two valid JIMS event log sources? (Choose two.)
A . Microsoft Windows Server 2012 audit logs
B . Microsoft Active Directory server event logs
C . Microsoft Exchange Server event logs
D . Microsoft Active Directory audit logs
Answer: B,C