What are three primary match criteria used in a Junos security policy? (Choose three.)
You are creating Ipsec connections.
In this scenario, which two statements are correct about proxy IDs? (Choose two.)
What is the order in which malware is detected and analyzed?
What are two valid address books? (Choose two.)
Screens on an SRX Series device protect against which two types of threats? (Choose two.)
Which two statements are correct about the integrated user firewall feature?(Choose two.)
You want to block executable files ("exe) from being downloaded onto your network.
Which UTM feature would you use in this scenario?
Which two components are configured for host inbound traffic? (Choose two.)
You want to enable the minimum Juniper ATP services on a branch SRX Series device.
In this scenario, what are two requirements to accomplish this task? (Choose two.)
What are two characteristics of a null zone? (Choose two.)