Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In an effort to reduce client-server latency transparent mode was enabled an SRX series device.

Which two types of traffic will be permitted in this scenario? (Choose Two )

A.

ARP

B.

Layer 2 non-IP multicast

C.

BGP

D.

IPsec

Which three type of peer devices are supported for Cos-Based IPsec VPN?

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

The monitor traffic interface command is being used to capture the packets destined to and the from the SRX Series device.

In this scenario, which two statements related to the feature are true? (Choose two.)

A.

This feature does not capture transit traffic.

B.

This feature captures ICMP traffic to and from the SRX Series device.

C.

This feature is supported on high-end SRX Series devices only.

D.

This feature is supported on both branch and high-end SRX Series devices.

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

A.

In the show security policies hit-count command output.

B.

In the show security flow statistics command output.

C.

In the show security policies detail command output.

D.

In the show firewall log command output.

Exhibit

Which two statements are correct about the output shown in the exhibit. (Choose two.)

A.

The source address is translated.

B.

The packet is an SSH packet

C.

The packet matches a user-configured policy

D.

The destination address is translated.

Which two features would be used for DNS doctoring on an SRX Series firewall? (Choose two.)

A.

The DNS ALG must be enabled.

B.

static NAT

C.

The DNS ALG must be disabled.

D.

source NAT

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Which statement is true about persistent NAT types?

A.

The target-host-port parameter cannot be used with IPv4 addresses in NAT46.

B.

The target-host parameter cannot be used with IPv6 addressee in NAT64.

C.

The target-host parameter cannot be used with IPv4 addresses in NAT46

D.

The target-host-port parameter cannot be used with IPv6 addresses in NAT64

which two statements about the configuration shown in the exhibit are correct ?

Exhibit:

A.

The remote IKE gateway IP address is 203.0.113.100.

B.

The local peer is assigned a dynamic IP address.

C.

The local IKE gateway IP address is 203.0.113.100.

D.

The remote peer is assigned a dynamic IP address.