You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

Click the Exhibit button.

You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

A)

B)

C)

D)

A . Option A
B . Option B
C . Option C
D . Option D

Answer: C

Explanation:

https://kb.juniper.net/InfoCenter/index?page=content&id=KB31080

Which statement is true about high availability (HA) chassis clusters for the SRX Series device?

Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
A . Cluster nodes require an upgrade to HA compliant Routing Engines.
B . Cluster nodes must be connected through a Layer 2 switch.
C . There can be active/passive or active/active clusters.
D . HA clusters must use NAT to prevent overlapping subnets between the nodes.

Answer: C

Which statement about the control link in a chassis cluster is correct?

Which statement about the control link in a chassis cluster is correct?
A . A cluster can have redundant control links.
B . Recovering from a control link failure requires a reboot.
C . The control link heartbeats contain the configuration file of the nodes.
D . The control messages sent over the link are encrypted by default.

Answer: A

Explanation:

Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-dual-control-links.html

Which two statements describe SSL proxy on SRX Series devices? (Choose two.)

Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
A . SSL proxy supports TLS version 1.2.
B . Client-protection is also known as reverse proxy.
C . SSL proxy is supported when enabled within logical systems.
D . SSL proxy relies on Active Directory to provide secure communication.

Answer: A,C

Explanation:

Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-ssl-tls.html

Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)

Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)
A . vSRX provides Layer 2 to Layer 7 secure services and cSRX provides Layer 4 to Layer 7 secure services.
B . cSRX requires less storage and memory space for a given deployment than vSRX-based solutions.
C . cSRX-based solutions are more scalable than vSRX-based solutions.
D . vSRX and cSRX both provide Layer 2 to Layer 7 secure services.
E . vSRX provides faster deployment time and faster reboots compared to cSR

Answer: A,B,C

Explanation:

Reference: https://www.juniper.net/documentation/en_US/day-one-books/topics/concept/juniper-vsrx-versus-csrx.html

Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)

Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)
A . JIMS synchronizes Active Directory authentication information between a primary and secondary JIMS server.
B . JIMS forwards Active Directory authentication information to SRX Series client devices.
C . JIMS collects and maintains a database of authentication information from Active Directory domains.
D . JIMS replicates Active Directory authentication information to non-trusted Active Directory domain controllers.

Answer: A,C

Explanation:

https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/services-user-identification-identity-management-connection-primary.html