A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication. Which type of user authentication is configured?
Answer : C
Explanation:
Web authentication is valid for all types of traffic. With Web authentication configured, users must first directly access the Junos security platform using HTTP. The user enters the address or hostname of the device into a Web browser and then receives a prompt for a username and password. If authentication is successful, the user can then access the restricted resource directly. Subsequent traffic from the same source IP address is automatically allowed access to the restricted resource, as long as security policy allows for it.
Click the Exhibit button.
Answer : A
Which two statements about staticNAT are true? (Choose two.)
Answer : BD
What is the proper sequence of evaluation for the SurfControl integrated Web filter solution?
Answer : B
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?
Answer : C
Which three parameters are configured in the IKE policy? (Choose three.)
Answer : ABD
Which statementis true regarding NAT?
Answer : D
Explanation:
The data plane on Junos security platforms, implemented on IOCs, NPCs, and SPCs for high-end devices and on CPU cores and PIMs for branch devices, consists of Junos OS packet-handling modules compounded with a flow engine and session management like that of the ScreenOS software. Intelligent packet processing ensures that one single thread exists for packet flow processing associated with a single flow. Real-time processes enable the Junos OS to perform session-based packet forwarding.
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails. Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?
Answer : B
Which two statements regarding external authentication servers for firewall user authentication are true? (Choose two.)
Answer : BD
Which three advanced permit actions within security policiesare valid? (Choose three.)
Answer : ACE
Which two statements regarding firewall user authentication client groups are true?
(Choose two.)
Answer : BC
You must configure a SCREEN option that would protect your device from a session table flood. Which configurationmeets this requirement?
Answer : D
For which network anomaly does Junos provide a SCREEN?
Answer : D
The Junos OS blocks an HTTP request due to the category of the URL. Which form of Web filtering is being used?
Answer : B
Which type of Web filtering by default builds a cache of server actions associated with each
URL it has checked?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us