<< Prev Question Next Question >>

Question 15/35

Which UTM feature should you use to protect users from visiting certain blacklisted websites?

Recent Comments (The most recent comments are at the top.)

moha - Jun 25, 2020

the correct answer is D.
&quot;The Web filtering lets you to manage Internet usage by preventing access to inappropriate Web content. There are four types of Web filtering solutions:
Redirect Web filtering—The redirect Web filtering solution intercepts HTTP and HTTPS requests and sends them to an external URL filtering server, provided by Websense, to determine whether to block the requests.
Redirect Web filtering does not require a license.
Local Web filtering—The local Web filtering solution intercepts every HTTP request and the HTTPS request in a TCP connection. In this case, the decision making is done on the device after it looks up a URL to determine if it is in the whitelist or blacklist based on its user-defined category.
Local Web filtering does not require a license or a remote category server.
Enhanced Web filtering—The enhanced Web filtering solution intercepts the HTTP and the HTTPS requests and sends the HTTP URL or the HTTPS source IP to the Websense ThreatSeeker Cloud (TSC). The TSC categorizes the URL into one of the 151 or more categories that are predefined and also provides site reputation information. The TSC further returns the URL category and the site reputation information to the device. The device determines if it can permit or block the request based on the information provided by the TSC. Starting in Junos OS Release 17.4R1, Websense redirect support IPv6 traffic.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (35q)
1 commentQuestion 1: A new SRX Series device has been delivered to your location....
Question 2: You want to generate reports from the l-Web on an SRX Series...
1 commentQuestion 3: Which management software supports metadata-based security p...
3 commentQuestion 4: Which statement about IPsec is correct?...
1 commentQuestion 5: Which two private cloud solution support vSRX devices? (Choo...
1 commentQuestion 6: Which statements is correct about global security policies?...
3 commentQuestion 7: Which two statements are correct about functional zones? (Ch...
1 commentQuestion 8: Which two statements are true about the null zone? (Choose t...
2 commentQuestion 9: Which two statements are correct about using global-based po...
1 commentQuestion 10: Which security object defines a source or destination IP add...
2 commentQuestion 11: Which two feature on the SRX Series device are common across...
3 commentQuestion 12: Firewall filters define which type of security?...
1 commentQuestion 13: Which two statements are true about UTM on an SRX340? (Choos...
1 commentQuestion 14: What are two characteristic of static NAT SRX Series devices...
1 commentQuestion 15: Which UTM feature should you use to protect users from visit...
1 commentQuestion 16: Which two elements are needed on an SRX Series device to set...
Question 17: What are configuring the antispam UTM feature on an SRX Seri...
1 commentQuestion 18: Which two match conditions would be used in both static NAT ...
Question 19: What are the valid actions for a source NAT rule in J-Web? (...
1 commentQuestion 20: What is the correct order of processing when configuring NAT...
1 commentQuestion 21: You are concerned that unauthorized traffic is using non-sta...
Question 22: You have configured antispam to allow e-mail from example.co...
Question 23: Which statement is correct about IKE?...
Question 24: Which three actions would be performed on traffic traversing...
Question 25: What must you do first to use the Monitor/Events workspace i...
1 commentQuestion 26: You configure and applied several global policies and some o...
1 commentQuestion 27: What should you configure if you want to translate private s...
Question 28: Which type of security policy protect restricted services fr...
1 commentQuestion 29: On an SRX device, you want to regulate traffic base on netwo...
1 commentQuestion 30: BY default, revenue interface are placed into which system-d...
1 commentQuestion 31: Users should not have access to Facebook, however, a recent ...
1 commentQuestion 32: Which method do VPNs use to prevent outside parties from vie...
Question 33: You are designing a new security policy on an SRX Series dev...
1 commentQuestion 34: On an SRX Series device, how should you configure your IKE g...
1 commentQuestion 35: Which two actions are performed on an incoming packet matchi...