Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Exhibit

You have recently configured Adaptive Threat Profiling and notice 20 IP address entries in the monitoring section of the Juniper ATP Cloud portal that do not match the number of entries locally on the SRX Series device, as shown in the exhibit.

What is the correct action to solve this problem on the SRX device?

A.

You must configure the DAE in a security policy on the SRX device.

B.

Refresh the feed in ATP Cloud.

C.

Force a manual download of the Proxy__Nodes feed.

D.

Flush the DNS cache on the SRX device.

Exhibit:

The security trace options configuration shown in the exhibit is committed to your SRX series firewall. Which two statements are correct in this Scenario? (Choose Two)

A.

The file debugger will be readable by all users.

B.

Once the trace has generated 10 log files, older logs will be overwritten.

C.

Once the trace has generated 10 log files, the trace process will halt.

D.

The file debugger will be readable only by the user who committed this configuration

Exhibit

Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.

Which two commands will solve this problem? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Exhibit

Referring to the exhibit, which three statements are true? (Choose three.)

A.

The packet's destination is to an interface on the SRX Series device.

B.

The packet's destination is to a server in the DMZ zone.

C.

The packet originated within the Trust zone.

D.

The packet is dropped before making an SSH connection.

E.

The packet is allowed to make an SSH connection.

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

A.

Mismatched proxy ID

B.

Mismatched peer ID

C.

Mismatched preshared key

D.

Incorrect peer address.

You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and

only uses a single Phase 2 SA for both sites.

In this scenario, which VPN should be used?

A.

An IPsec group VPN with the corporate firewall acting as the hub device.

B.

Full mesh IPsec VPNs with tunnels between all sites.

C.

A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.

D.

A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Which two types of source NAT translations are supported in this scenario? (Choose two.)

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.

The packet is silently discarded.

B.

The packet is part of an existing session.

C.

The packet is part of a new session.

D.

The packet is explicitly rejected.