Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Which two statements are correct about a policy scheduler? (Choose two.)

A.

A policy scheduler can only be applied when using the policy-rematch feature.

B.

A policy scheduler can be dynamically activated based on traffic flow volumes.

C.

A policy scheduler can be defined using a daily schedule.

D.

A policy scheduler determines the time frame that a security policy is actively evaluated.

Which three statements about SRX Series device chassis clusters are true? (Choose three.)

A.

Chassis cluster control links must be configured using RFC 1918 IP addresses.

B.

Chassis cluster member devices synchronize configuration using the control link.

C.

A control link failure causes the secondary cluster node to be disabled.

D.

Recovery from a control link failure requires that the secondary member device be rebooted.

E.

Heartbeat messages verify that the chassis cluster control link is working.

Your manager asks you to provide firewall and NAT services in a private cloud.

Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

A.

a single vSRX

B.

a vSRX for firewall services and a separate vSRX for NAT services

C.

a cSRX for firewall services and a separate cSRX for NAT services

D.

a single cSRX

You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows.

In this scenario, which two statements are correct? (Choose two.)

A.

The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the low-watermark value is met.

B.

The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the high-watermark value is met.

C.

The high-watermark configuration specifies the percentage of how much of the session table is left before disabling a more aggressive age- out timer.

D.

The high-watermark configuration specifies the percentage of how much of the session table can be allocated before applying a more aggressive age-out timer

Which two statements are correct about a reth LAG? (Choose two.)

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Which two statements about SRX chassis clustering are correct? (Choose two.)

A.

SRX chassis clustering supports active/passive and active/active for the data plane.

B.

SRX chassis clustering only supports active/passive for the data plane.

C.

SRX chassis clustering supports active/passive for the control plane.

D.

SRX chassis clustering supports active/active for the control plane.

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair.

Which step is necessary to accomplish this task?

A.

Issue the set chassis cluster disable reboot command on the primary node.

B.

Implement the control link recover/ solution before adjusting the priorities.

C.

Manually request the failover and identify the secondary node

D.

Adjust the priority in the configuration on the secondary node.

Which two statements are correct about Juniper ATP Cloud? (Choose two.)

A.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.

B.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats levels range from 0 to 10 minutes.

C.

The threat levels range from 0-10.

D.

The threat levels range from 0-100.