<< Prev Question Next Question >>

Question 15/52

You have created a zones-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so.
What are two reasons for this access failure? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (52q)
Question 1: Which two statements are correct about functional zones? (Ch...
Question 2: Users in your network are downloading files with file extens...
Question 3: Which two notifications are available when the antivirus eng...
Question 4: Which statement is correct about packet mode processing?...
Question 5: A security zone is configured with the source IP address 192...
Question 6: Which statement about IPsec is correct?...
Question 7: Which two match conditions would be used in both static NAT ...
Question 8: What should you configure if you want to translate private s...
Question 9: What are two characteristic of static NAT SRX Series devices...
Question 10: What is a type of security feed that Sky ATP provides to a v...
Question 11: What are configuring the antispam UTM feature on an SRX Seri...
Question 12: What are three primary match criteria used in a Junos securi...
Question 13: You have configured a Web filtering UTM policy? Which action...
Question 14: What are three Junos UTM features? (Choose three.)...
Question 15: You have created a zones-based security policy that permits ...
Question 16: What is the purpose of the Shadow Policies workspace in J-We...
Question 17: When configuring IPsec VPNs, setting a hash algorithm solves...
Question 18: A new SRX Series device has been delivered to your location....
Question 19: Which two statements are correct about the default behavior ...
Question 20: You configure and applied several global policies and some o...
Question 21: What are two valid address books? (Choose two.)...
Question 22: On an SRX Series device, how should you configure your IKE g...
Question 23: Which two components are configured for host inbound traffic...
Question 24: When operating in packet mode, which two services are availa...
Question 25: Which statement is correct about unified security policies o...
Question 26: Which two segments describes IPsec VPNs? (Choose two.)...
Question 27: What is the definition of zone on an SRX series devices?...
Question 28: What is the correct order of processing when configuring NAT...
Question 29: Which two feature on the SRX Series device are common across...
Question 30: You are asked to configure your SRX Series device to block a...
Question 31: Which statement is correct about global security policies on...
Question 32: Which two statements are correct about using global-based po...
Question 33: Which two actions are performed on an incoming packet matchi...
Question 34: Which three actions would be performed on traffic traversing...
Question 35: Unified threat management (UTM) inspects traffic from which ...
Question 36: Which two statements are correct about functional zones? (Ch...
Question 37: You are configuring an IPsec VPN tunnel between two location...
Question 38: What must be enabled on an SRX Series device for the reporti...
Question 39: Which zone is considered a functional zone?...
Question 40: When configuring antispam, where do you apply any local list...
Question 41: Which statements about NAT are correct? (Choose two.)...
Question 42: Which two statements are correct about global security polic...
Question 43: You want to integrate an SRX Series device with SKY ATP. Wha...
Question 44: Which order is correct for Junos security devices that exami...
Question 45: Which two UTM features should be used for tracking productiv...
Question 46: Click the Exhibit button. (Exhibit) Which two user roles sho...
Question 47: Which two statements are correct about security zones? (choo...
Question 48: Which method do VPNs use to prevent outside parties from vie...
Question 49: Which two security features inspect traffic at Layer 7? (Cho...
Question 50: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 51: You want to prevent other users from modifying or discarding...
Question 52: What information does the show chassis routing-engine comman...