Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
Aforward proxy
Bclient protection proxy
Cserver protection proxy
Dreverse proxy
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
AChassis cluster control links must be configured using RFC 1918 IP addresses.
BChassis cluster member devices synchronize configuration using the control link.
CA control link failure causes the secondary cluster node to be disabled.
DRecovery from a control link failure requires that the secondary member device be rebooted.
EHeartbeat messages verify that the chassis cluster control link is working.
Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)
AReal-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.
BIn an active/active configuration, inter-chassis transit traffic is sent over the fab interface.
CThe fab interface enables configuration synchronization.
DHeartbeat signals sent on the fab interface monitor the health of the control plane link.
When a security policy is deleted, which statement is correct about the default behavior for active sessions allowed by that policy?
AThe active sessions allowed by the policy will be dropped.
BThe active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.
CThe active sessions allowed by the policy will be reevaluated by the cached policy rules.
DThe active sessions allowed by the policy will continue unchanged.
Which two statements are true about mixing traditional and unified security policies? (Choose two.)
AWhen a packet matches a unified security policy, the evaluation process terminates.
BTraditional security policies must come before unified security policies.
CUnified security policies must come before traditional security policies.
DWhen a packet matches a traditional security policy, the evaluation process terminates.
Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)
Abuilding blocks
Bassets
Cevents
Dtests
Which two statements are correct about Juniper ATP Cloud? (Choose two.)
AOnce the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.
BOnce the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 10 minutes.
CThe threat levels range from 0-10.
DThe threat levels range from 0-100.
You are experiencing excessive packet loss on one of your two WAN links, each link coming from a different provider. You want to automatically route traffic from the degraded link to the working link.
Which AppSecure component would you use to accomplish this task?
AAppFW
BAppQoE
CAppQoS
DAPBR
Which statement defines the function of an Application Layer Gateway (ALG)?
AThe ALG uses software processes for permitting or disallowing specific IP address ranges.
BThe ALG uses software that is used by a single TCP session using the same port numbers as the application.
CThe ALG contains protocols that use one application session for each TCP session.
DThe ALG uses software processes for managing specific protocols.
Which two statements are correct when considering IPS rule base evaluation? (Choose two.)
AIPS evaluates rules concurrently.
BIPS applies the most severe action to traffic matching multiple rules.
CIPS evaluates rules sequentially.
DIPS applies the least severe action to traffic matching multiple rules.
How does the SSL proxy detect if encryption is being used?
AIt uses application identity services.
BIt verifies the length of the packet.
CIt queries the client device.
DIt looks at the destination port number.
You want to deploy a virtualized SRX in your environment.
In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)
AThe vSRX supports Layer 2 and Layer 3 configurations.
BOnly the vSRX provides clustering.
CThe vSRX has faster boot times.
DOnly the vSRX provides NAT, IPS, and UTM services.
Which method does the IoT Security feature use to identify traffic sourced from IoT devices?
AThe SRX Series device streams metadata from the IoT device transit traffic to Juniper ATP Cloud.
BThe SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.
CThe SRX Series device identifies IoT devices using their MAC addresses.
DThe SRX Series device identifies IoT devices from metadata extracted from their transit traffic.
After JSA receives external events and flows, which two steps occurs? (Choose two.)
AAfter formatting the data, the data is stored in an asset database.
BBefore formatting the data, the data is analyzed for relevant information.
CBefore the information is filtered, the information is formatted.
DAfter the information is filtered, JSA responds with active measures.
You want to use IPS signatures to monitor traffic.
Which module in the AppSecure suite will help in this task?
AAppTrack
BAppQoS
CAppFW
DAPPID
You administer a JSA host and want to include a rule that sets a threshold for excessive firewall denies and sends an SNMP trap after receiving related syslog messages from an SRX Series firewall.
Which JSA rule type satisfies this requirement?
Acommon
Boffense
Cflow
Devent
Click the Exhibit button.
Which two statements describe the output shown in the exhibit? (Choose two.)
ARedundancy group 1 experienced an operational failure.
BRedundancy group 1 was administratively failed over.
CNode 0 is controlling traffic for redundancy group 1.
DNode 1 is controlling traffic for redundancy group 1.
You are asked to reduce the load that the JIMS server places on your corporate domain controller.
Which action should you take in this situation?
AConnect JIMS to the RADIUS server.
BConnect JIMS to the domain Exchange server.
CConnect JIMS to the domain SQL server.
DConnect JIMS to another SRX Series device.
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.
In this scenario, what is the correct order for rebooting the devices?
AReboot the secondary device, then the primary device.
BReboot only the secondary device since the primary will assign itself the correct cluster and node ID.
CReboot the primary device, then the secondary device.
DReboot only the primary device since the secondary will assign itself the correct cluster and node ID.
You are deploying a new SRX Series device and you need to log denied traffic.
In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)