What are two available methods used to authenticate users connecting to an SRX Series device? (Choose two.)
Answer : AD
Click the Exhibit button.
Answer : AD
In which order are NAT types evaluated?
Answer : C
Click the Exhibit button.
Answer : C
Which security feature is applied to traffic on an SRX Series device when the device is running in packet mode?
Answer : A
Firewall filters define which type of security?
Answer : B
Users in your network are downloading files with file extensions that you consider to be unsafe for your network. You must prevent files with specific file extensions from entering your network.
Which UTM feature should be enabled on an SRX Series device to accomplish this task?
Answer : A
You want to automatically generate the encryption and authentication keys during IPsec VPN tunnel establishment.
What would be used to accomplish this task?
Answer : D
Which two statements about security policy processing on SRX Series devices are true? (Choose two.)
Answer : AC
You are asked to run a report to find the top talkers on your network in the past 48 hours.
In this scenario, the report will be in which format when the J-Web UI delivers it to you?
Answer : B
Which UTM feature should you use to protect users from visiting certain blacklisted websites?
Answer : B
Which two statements are true about security policies in the factory-default configuration of an SRX340? (Choose two.)
Answer : AD
Which two actions are performed on an incoming packet matching an existing session? (Choose two.)
Answer : BC
On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office using a dynamic IP address?
Answer : B
What must you do first to use the Monitor/Events workspace in the J-Web interface?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us