Which two statements are correct in this scenario about the control-link settings?
You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering. Which two statements are correct in this scenario about the control-link settings? (Choose two.)A . In the vSwitch security settings, accept promiscuous mode. B. In the vSwitch properties...
Which feed will the clients IP address be automatically added to in this situation?
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold. Which feed will the clients IP address be automatically added to in this situation?A . the command-and-control cloud feed B. the allowlist and blocklist feed C. the custom cloud feed D....
In this scenario, which two statements are correct?
You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows. In this scenario, which two statements are correct? (Choose two.)A . The early-ageout configuration specifies the timeout value, in...
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?A . The active sessions allowed by the policy will be dropped. B. The active sessions allowed by the policy will be marked as a legacy flow and will continue...
Which configuration should you use in this scenario?
Your company is using the Juniper ATP Cloud free model. The current inspection profile is set at 10 MB You are asked to configure ATP Cloud so that executable files up to 30 MB can be scanned while at the same time minimizing the change in scan time for other...
Which action should you take in this situation?
You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?A . Connect JIMS to the RADIUS server B. Connect JIMS to the domain Exchange server C. Connect JIMS to the domain SQL server. D. Connect JIMS to another...
Referring to the exhibit which statement is true?
Exhibit Referring to the exhibit which statement is true?A . SSL proxy functions will ignore the session. B. SSL proxy leverages post-match results. C. SSL proxy must wait for return traffic for the final match to occur. D. SSL proxy leverages pre-match resultView AnswerAnswer: D
which method does the lot Security feature use to identify traffic sourced from loT devices?
which method does the lot Security feature use to identify traffic sourced from loT devices?A . The SRX Series device identifies loT devices from metadata extracted from their transit traffic. B. The SRX Series device streams transit traffic received from the loT device to Juniper ATP Cloud C. The SRX...
How does Juniper ATP Cloud protect a network from zero-day threats?
How does Juniper ATP Cloud protect a network from zero-day threats?A . lt uses known virus signatures: B. It uses a cache lookup: C. lt uses dynamic analysis D. It uses antivirus softwareView AnswerAnswer: A
Which solution enables you to create security policies that include user and group information?
Which solution enables you to create security policies that include user and group information?A . NETCONF B. JIMS C. ATP Appliance D. Network DirectorView AnswerAnswer: A