Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values configured on the SRX client?

Click the Exhibit button. Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values configured on the SRX client? (Choose two.)A . IPv6 ReportingB . Client IDC . Client SecretD . Token LifetimeView AnswerAnswer: B,C Explanation: Reference: https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-srx-configuring.html

March 2, 2021 No Comments READ MORE +

Which two statements describe JSA? (Choose two.)

Which two statements describe JSA? (Choose two.)A . Security Director must be used to view third-party events rom JSA flow collectors.B . JSA supports events and flows from Junos devices, including third-party devices.C . JSA events must be manually imported into Security Directory using an SSH connection.D . JSA can...

March 2, 2021 No Comments READ MORE +

In this scenario, which two elements are mapped to applications in the application system cache?

You are deploying the Junos application firewall feature in your network. In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)A . destination portB . source portC . destination IP addressD . source IP addressView AnswerAnswer: A,C

March 2, 2021 No Comments READ MORE +

Which statement is correct in this scenario?

You are configuring a client-protection SSL proxy profile. Which statement is correct in this scenario?A . A server certificate is not used but a root certificate authority is used.B . A server certificate and root certificate authority are not used.C . A server certificate is used but a root certificate...

March 1, 2021 No Comments READ MORE +

Referring to the exhibit, which statement is true?

Click the Exhibit button. Referring to the exhibit, which statement is true?A . IDP blocks root users.B . IDP closes the connection on matched sessions.C . IDP ignores the connection on matched sessions.D . IDP blocks all users.View AnswerAnswer: C

March 1, 2021 No Comments READ MORE +

Which two statements describe application-layer gateways (ALGs)? (Choose two.)

Which two statements describe application-layer gateways (ALGs)? (Choose two.)A . ALGs are designed for specific protocols that require multiple sessions.B . ALGs are used with protocols that use multiple ports.C . ALGs can only be configured using Security Director.D . ALGs are designed for specific protocols that use a single...

February 28, 2021 No Comments READ MORE +

What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?

What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?A . 4B . 10C . 3D . 12View AnswerAnswer: B

February 27, 2021 No Comments READ MORE +

When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)

When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)A . A security policy can reference both a client-protection SSL proxy profile and a server-protection proxy profile.B . If you apply an SSL proxy profile to a security policy and forget to apply...

February 26, 2021 No Comments READ MORE +

What must be enabled on the interconnecting switch to accomplish this task?

You want to support reth LAG interfaces on a chassis cluster. What must be enabled on the interconnecting switch to accomplish this task?A . RSTPB . 802.3adC . LLDPD . swfabView AnswerAnswer: B Explanation: Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-redundant-ethernet-lag-interfaces.html

February 25, 2021 No Comments READ MORE +

Which two statements are correct about server-protection SSP proxy? (Choose two.)

Which two statements are correct about server-protection SSP proxy? (Choose two.)A . The server-protection SSL proxy intercepts the server certificate.B . The server-protection SSL proxy is also known as SSL reverse proxy.C . The server-protection SSL proxy forwards the server certificate after modification.D . The server-protection SSL proxy acts as...

February 25, 2021 No Comments READ MORE +