<< Prev Question Next Question >>

Question 12/30

Which management software supports metadata-based security policies that are ideal for cloud deployments?

Recent Comments (The most recent comments are at the top.)

Josef - Jul 08, 2020

I think that correct is B, because i found configuration for metadata onfy in SD see:
https://www.juniper.net/documentation/en_US/junos-space18.2/topics/concept/junos-space-metadata-overview.html

moha - Jul 05, 2020

The correct answer is B
Explanation:&quot;https://www.juniper.net/us/en/products-services/security/security-director/&quot;

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (30q)
1 commentQuestion 1: Which statements about NAT are correct? (Choose two.)...
Question 2: What are the valid actions for a source NAT rule in J-Web? (...
1 commentQuestion 3: Which type of security policy protect restricted services fr...
2 commentQuestion 4: Which two private cloud solution support vSRX devices? (Choo...
2 commentQuestion 5: Users should not have access to Facebook, however, a recent ...
3 commentQuestion 6: A new SRX Series device has been delivered to your location....
2 commentQuestion 7: Which statement is correct about IKE?...
1 commentQuestion 8: Which two actions are performed on an incoming packet matchi...
Question 9: Referring to the exhibit. (Exhibit) Which type of NAT is bei...
2 commentQuestion 10: Which two statements are true about UTM on an SRX340? (Choos...
2 commentQuestion 11: The free licensing model for Sky ATP includes which features...
2 commentQuestion 12: Which management software supports metadata-based security p...
2 commentQuestion 13: On an SRX device, you want to regulate traffic base on netwo...
Question 14: You have created a zones-based security policy that permits ...
Question 15: Which statement about IPsec is correct?...
Question 16: Which statements is correct about Junos security zones?...
2 commentQuestion 17: What are two characteristic of static NAT SRX Series devices...
1 commentQuestion 18: Which statement about IPsec is correct?...
Question 19: Host-inbound-traffic is configured on the DMZ zone and the g...
1 commentQuestion 20: Which two notifications are available when the antivirus eng...
1 commentQuestion 21: Your company uses SRX Series devices to secure the edge of t...
1 commentQuestion 22: Which actions would be applied for the pre-IDdefault policy ...
1 commentQuestion 23: You are concerned that unauthorized traffic is using non-sta...
Question 24: You want to automatically generate the encryption and authen...
1 commentQuestion 25: Which two statements are true about security policy actions?...
1 commentQuestion 26: Which two elements are needed on an SRX Series device to set...
Question 27: Referring to the exhibit. ****Exhibit is Missing**** Which t...
1 commentQuestion 28: Which two statements are true about UTM on an SRX340? (Choos...
Question 29: Your company has been assigned one public IP address. You wa...
1 commentQuestion 30: BY default, revenue interface are placed into which system-d...