Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

you configured a security policy permitting traffic from the trust zone to the untrust zone but your

traffic not hitting the policy.

In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?

A.

show security policy-report

B.

show security application-tracking counters

C.

show security match-policies

D.

request security policies check

You want traffic to avoid the flow daemon for administrative task.

In this scenario which two stateless service are available with selective stateless packet based service. (Choose Two)

A.

Layer 2 switching

B.

IPv4 routing

C.

IPsec

D.

IPv6 routing

Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

A.

8080

B.

443

C.

80

D.

22

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The SRX-1 device can use the Proxy__Nodes feed in another security policy.

B.

You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.

C.

The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.

D.

You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.

Exhibit

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

You issue the command shown in the exhibit.

Which policy will be active for the identified traffic?

A.

Policy p4

B.

Policy p7

C.

Policy p1

D.

Policy p12

Exhibit:

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

A.

Modify the log-all term to add the next term action

B.

Delete the log-all term

C.

Add a term before the log-all term that blocks Telnet

D.

Apply a firewall filter to the loopback interface that blocks Telnet traffic

your company wants to take your juniper ATP appliance into private mode. You must give them a list

of impacted features for this request.

Which two features are impacted in this scenario? (Choose two)

A.

False Positive Reporting

B.

Threat Progression Monitoring

C.

GSS Telemetry

D.

Cyber Kill Chain mapping