<< Prev Question Next Question >>

Question 31/35

Users should not have access to Facebook, however, a recent examination of the logs security show that users are accessing Facebook.
Referring to the exhibit,

what should you do to solve this problem?

Recent Comments (The most recent comments are at the top.)

moha - Jul 08, 2020

the correct answer is A

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (35q)
1 commentQuestion 1: A new SRX Series device has been delivered to your location....
Question 2: You want to generate reports from the l-Web on an SRX Series...
1 commentQuestion 3: Which management software supports metadata-based security p...
3 commentQuestion 4: Which statement about IPsec is correct?...
1 commentQuestion 5: Which two private cloud solution support vSRX devices? (Choo...
1 commentQuestion 6: Which statements is correct about global security policies?...
3 commentQuestion 7: Which two statements are correct about functional zones? (Ch...
1 commentQuestion 8: Which two statements are true about the null zone? (Choose t...
2 commentQuestion 9: Which two statements are correct about using global-based po...
1 commentQuestion 10: Which security object defines a source or destination IP add...
2 commentQuestion 11: Which two feature on the SRX Series device are common across...
3 commentQuestion 12: Firewall filters define which type of security?...
1 commentQuestion 13: Which two statements are true about UTM on an SRX340? (Choos...
1 commentQuestion 14: What are two characteristic of static NAT SRX Series devices...
1 commentQuestion 15: Which UTM feature should you use to protect users from visit...
1 commentQuestion 16: Which two elements are needed on an SRX Series device to set...
Question 17: What are configuring the antispam UTM feature on an SRX Seri...
1 commentQuestion 18: Which two match conditions would be used in both static NAT ...
Question 19: What are the valid actions for a source NAT rule in J-Web? (...
1 commentQuestion 20: What is the correct order of processing when configuring NAT...
1 commentQuestion 21: You are concerned that unauthorized traffic is using non-sta...
Question 22: You have configured antispam to allow e-mail from example.co...
Question 23: Which statement is correct about IKE?...
Question 24: Which three actions would be performed on traffic traversing...
Question 25: What must you do first to use the Monitor/Events workspace i...
1 commentQuestion 26: You configure and applied several global policies and some o...
1 commentQuestion 27: What should you configure if you want to translate private s...
Question 28: Which type of security policy protect restricted services fr...
1 commentQuestion 29: On an SRX device, you want to regulate traffic base on netwo...
1 commentQuestion 30: BY default, revenue interface are placed into which system-d...
1 commentQuestion 31: Users should not have access to Facebook, however, a recent ...
1 commentQuestion 32: Which method do VPNs use to prevent outside parties from vie...
Question 33: You are designing a new security policy on an SRX Series dev...
1 commentQuestion 34: On an SRX Series device, how should you configure your IKE g...
1 commentQuestion 35: Which two actions are performed on an incoming packet matchi...