Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are three primary match criteria used in a Junos security policy? (Choose three.)

A.

application

B.

source address

C.

source port

D.

class

E.

destination address

You are creating Ipsec connections.

In this scenario, which two statements are correct about proxy IDs? (Choose two.)

A.

Proxy IDs are used to configure traffic selectors.

B.

Proxy IDs are optional for Phase 2 session establishment.

C.

Proxy IDs must match for Phase 2 session establishment.

D.

Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.

What is the order in which malware is detected and analyzed?

A.

antivirus scanning –> cache lookup –> dynamic analysis –> static analysis

B.

cache lookup –> antivirus scanning –> static analysis –> dynamic analysis

C.

antivirus scanning –> cache lookup –> static analysis –> dynamic analysis

D.

cache lookup –> static analysis –> dynamic analysis –> antivirus scanning

What are two valid address books? (Choose two.)

A.

66.129.239.128/25

B.

66.129.239.154/24

C.

66.129.239.0/24

D.

66.129.239.50/25

Screens on an SRX Series device protect against which two types of threats? (Choose two.)

A.

IP spoofing

B.

ICMP flooding

C.

zero-day outbreaks

D.

malicious e-mail attachments

Which two statements are correct about the integrated user firewall feature?(Choose two.)

A.

It maps IP addresses to individual users.

B.

It supports IPv4 addresses.

C.

It allows tracking of non-Windows Active Directory users.

D.

It uses the LDAP protocol.

You want to block executable files ("exe) from being downloaded onto your network.

Which UTM feature would you use in this scenario?

A.

IPS

B.

Web filtering

C.

content filtering

D.

antivirus

Which two components are configured for host inbound traffic? (Choose two.)

A.

zone

B.

logical interface

C.

physical interface

D.

routing instance

You want to enable the minimum Juniper ATP services on a branch SRX Series device.

In this scenario, what are two requirements to accomplish this task? (Choose two.)

A.

Install a basic Juniper ATP license on the branch device.

B.

Configure the juniper-atp user account on the branch device.

C.

Register for a Juniper ATP account on https://sky.junipersecurity.net.

D.

Execute the Juniper ATP script on the branch device.

What are two characteristics of a null zone? (Choose two.)

A.

The null zone is configured by the super user.

B.

By default, all unassigned interfaces are placed in the null zone.

C.

All ingress and egress traffic on an interface in a null zone is permitted.

D.

When an interface is deleted from a zone, it is assigned back to the null zone.