You are configuring a redundancy group using Ethernet interfaces.
In this scenario, which two actions must be performed? (Choose two.)
AAssign a physical interface from each node to the reth0 interface.
BSet the retry interval
CDefine the number of reth interfaces in a cluster under the chassis cluster hierarchy.
DConfigure the heartbeat interval.
Which three actions does Junos Space Security Director perform during the device discovery process? (Choose three.)
AIt imports the device’s active device configuration.
Bit reboots the device.
CIt imports device status information.
DIt adds a local superuser account to the device configuration.
EIt connects to the device using SSH.
Referring to the exhibit, which two statements are correct? (Choose two.)
AIP address 192.168.1.10 is the SRX Series device.
BIP address 192.168.1.10 is the primary JIMS server.
CThe JIMS server to the domain controller connection is online.
DThe SRX Series device to the JIMS connection is online.
You want to configure the SSL proxy feature on your SRX Series Firewall.
Which two actions must you perform to accomplish this task? (Choose two.)
AEnable the SSL ALG.
BCreate an SSL proxy profile.
CCreate an SSL application object.
DAssociate an SSL proxy profile with a security policy.
You want to use user identity information to secure your network.
Which two actions must you perform on your SRX Series Firewall to accomplish this task? (Choose two.)
ACreate security policies that include user identity configuration
BAdd user accounts to the Active Directory Domain Users group
CConfigure an identity provider on your SRX Series Firewall.
DAdd the user identity feature license to your SRX Series Firewall.
You are asked to onboard an SRX Series device to Junos Space Security Director, but it is not working.
In this scenario, what are three areas that should be reviewed? (Choose three.)
Achassis serial number
BSSH port number
Cactive security policies
Dauthentication credentials
EIP address
When creating an IPsec tunnel, which type of encryption uses public and private keys?
Asymmetric encryption
Basymmetric encryption
CDES encryption
DAES encryption
What is a function of the Juniper Identity Management Service?
Aencrypting user e-mail
Blogging malicious code sent through ingress and egress ports
Cencrypting network data traffic
Dmaintaining a centralized authentication table
Which three different objects would be created, modified, cloned, and deleted in the Shared Objects workspace of Junos Space Security Director? (Choose three.)
Ageo IP
BIP address
Caudit logs
Dpolicy enforcement groups
Epolicy rules
Using Junos Space Security Director, you want to configure a unique firewall policy for a specific SRX Series device.
Which firewall policy rules you would satisfy the requirement?
Aall devices policy prerules
Bgroup policy prerules
Cdevice policy rules
Dall devices policy postrules
Which IDP action is also referred to as a silent discard?
Ano action
Bclose client and server
Cignore connection
Ddrop packet
Which two statements describe how Juniper ATP Cloud improves security? (Choose two.)
AIt tracks and logs malicious traffic.
BIt offers real-time threat analysis and mitigation.
CIt simulates real user environments to trigger malicious code execution.
DIt increases performance speeds.
What does the exhibit indicate when you have configured a single IPsec VPN on an SRX Series Firewall?
AThe IPsec VPN has encountered errors during packet transmission.
BThe IPsec VPN is established, and traffic is passing through.
CThe IPsec VPN is not established.
DThe IPsec VPN is established, but no traffic is passing through.
Which three algorithms are used to encrypt IP packets? (Choose three.)
AData Encryption Standard (DES)
BSecure Hash Algorithm (SHA) - 1
CMessage Digest 5 (MD5)
DTriple Data Encryption Standard (3DES)
EAdvanced Encryption Standard (AES)
A pair of branch SRX Series devices are booted up in cluster mode.
Referring to the exhibit, which statement is correct?
Athe devices are not running the same version of Junos.
Bthe devices are not the same hardware.
Cfxp0 or fxp1 on either device has an existing configuration.
Dnode1 is running a "factory-default config".
Which two statements are correct about redundant fabric interfaces in a chassis cluster? (Choose two.)
Afab0 and fab1 are located on both node0 and node1.
Bfab0 is located on node0, whereas fab1 is located on node1.
CThe media type must be the same for each redundant fabric interface.
DThe media type can be different for each redundant fabric interface.
Which two statements are correct about fabric interfaces on an SRX Series Firewall? (Choose two.)
AIn an active/active configuration, inter-chassis traffic uses the fab link.
BIn an active/passive configuration, inter-chassis traffic uses the fab link.
CThe node ID is reflected in the fabric interface name.
DThe cluster ID is reflected in the fabric interface name.
Which statement is correct about Active Directory as an identity source for identity-aware security policies?
AIt supports a maximum of two domains.
BIt supports logical systems.
CIt supports 20 Active Directory servers per domain.
DIt tracks non-Windows Active Directory users.
You are asked to use Junos Space Security Director to download the latest application signatures in the AppID database.
In this scenario, which two statements are correct? (Choose two.)
AThe AppID database is stored in Junos Space Security Director.
BThe AppID database is stored on the managed SRX Series device.
CThe AppID database is maintained by a third-party host.
DThe AppID database is stored on a local storage server in the management network.
Which two statements are correct about IDP policy templates? (Choose two.)
AThey are provided by Juniper Networks.
BThey are not customizable.
CThey are available on a “factory-default config.”
DThey must be installed.
Which two steps are necessary to prepare the Active Directory domain for a JIMS installation? (Choose two.)
ACreate two limited access user accounts.
BCreate three limited access user accounts.
CAdd one full access user account to Active Directory groups.
DAdd limited access user accounts to Active Directory groups.
What are two ways to help reduce false positives for an IDP rule? (Choose two.)
AChange the rule to a lower severity action.
BRemove the attack object from the rule.
CCreate an exempt rule.
DConfigure a terminal rule at the end of the rule base.
In Juniper high availability (HA) SRX Series device implementations, which interface will be used to exchange session state, configuration files, and ensure session continuity across nodes using the proprietary Trivial Network Protocol?
Afab
Bfxp0
Cfxp1
Dswfab
What are three policy types available in Junos Space Security Director? (Choose three.)
Adevice
Blocal
Cgroup
Duniversal
Eglobal
You need to secure communications from a mobile command center which uses a 5G mobile ISP behind CGNAT to an SRX Series Firewall at headquarters.
Which two actions should be performed on the SRX Series Firewall in this scenario? (Choose two.)
AConfigure the IPsec VPN to use NAT-T.
BConfigure the IPsec VPN to use IKEv1 aggressive mode.
CConfigure the IPsec VPN to use IKEv2 aggressive mode.