<< Prev Question Next Question >>

Question 12/99

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.
Which Juniper Networks solution will accomplish this task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (99q)
Question 1: What are two management methods for cSRX? (Choose two.)...
Question 2: You are asked to create an IPS-exempt rule base to eliminate...
Question 3: Your manager asks you to provide firewall and NAT services i...
Question 4: You have deployed JSA and you need to view events and networ...
Question 5: Referring to the exhibit, which two statements describe the ...
Question 6: Which statement describes the AppTrack module in AppSecure?...
Question 7: Which two statements describe superflows in Juniper Secure A...
Question 8: Your company is using the Juniper ATP Cloud free model. The ...
Question 9: Referring to the SRX Series flow module diagram shown in the...
Question 10: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 11: Which feature is used when you want to permit traffic on an ...
Question 12: You are asked to find systems running applications that incr...
Question 13: You are preparing a proposal for a new customer who has subm...
Question 14: You are asked to convert two standalone SRX Series devices t...
Question 15: What are two requirements for enabling AppQoE? (Choose two.)...
Question 16: Which two statements are correct about AppTrack? (Choose two...
Question 17: You must fine tune an IPS security policy to eliminate false...
Question 18: Which two statements are true about the vSRX? (Choose two.)...
Question 19: Which two session parameters would be used to manage space o...
Question 20: Which two solutions provide a sandboxing feature for finding...
Question 21: You have deployed an SRX300 Series device and determined tha...
Question 22: What are two valid JIMS event log sources? (Choose two.)...
Question 23: You want to deploy a virtualized SRX in your environment. In...
Question 24: Which sequence does an SRX Series device use when implementi...
Question 25: You need to implement Junos Screen options to protect traffi...
Question 26: You are asked to block malicious applications regardless of ...
Question 27: Which statement about the control link in a chassis cluster ...
Question 28: What are two examples of RTOs? (Choose two.)...
Question 29: You are configuring logging for a security policy. In this s...
Question 30: You are asked to ensure that if the session table on your SR...
Question 31: Which solution enables you to create security policies that ...
Question 32: After JSA receives external events and flows, which two step...
Question 33: Which two statements are correct about the fab interface in ...
Question 34: You are building a VPN tunnel between two SRX Series devices...
Question 35: Which two statements are correct about a policy scheduler? (...
Question 36: Which two statements describe application-layer gateways (AL...
Question 37: Which security log message format reduces the consumption of...
Question 38: You are asked to ensure that servers running the Ubuntu OS w...
Question 39: While working on an SRX firewall, you execute the show secur...
Question 40: What are two elements of a custom IDP/IPS attack object? (Ch...
Question 41: Which two statements are true about the vSRX? (Choose two.)...
Question 42: Which two statements are true about Juniper ATP Cloud? (Choo...
Question 43: Which three statements are correct about fabric interfaces o...
Question 44: Your network uses a single JSA host and you want to implemen...
Question 45: Which two statements are correct about Juniper ATP Cloud? (C...
Question 46: Which two functions are performed by Juniper Identity Manage...
Question 47: The output shown in the exhibit is displayed in which format...
Question 48: Which two statements apply to policy scheduling? (Choose two...
Question 49: Click the Exhibit button. (Exhibit) You have deployed Sky AT...
Question 50: Click the Exhibit button. Which two statements describe the ...
Question 51: The AppQoE module of AppSecure provides which function?...
Question 52: The output shown in the exhibit is displayed in which format...
Question 53: Which statement regarding Juniper Identity Management Servic...
Question 54: What are two benefits of using a vSRX in a software-defined ...
Question 55: You need to deploy an SRX Series device in your virtual envi...
Question 56: You want to set up JSA to collect network traffic flows from...
Question 57: When a security policy is deleted, which statement is correc...
Question 58: Which two statements describe how rules are used with Junipe...
Question 59: Which two statements are correct about the Junos IPS feature...
Question 60: Which two statements are correct about a reth LAG? (Choose t...
Question 61: You must block the lateral spread of Remote Administration T...
Question 62: When referencing a SSL proxy profile in a security policy, w...
Question 63: Click the Exhibit button. You are validating the configurati...
Question 64: You are troubleshooting unexpected issues on your JIMS serve...
Question 65: You want to use IPS signatures to monitor traffic. Which mod...
Question 66: Which two statements describe the output shown in the exhibi...
Question 67: You have implemented SSL proxy client protection. After impl...
Question 68: You want to permit access to an application but block applic...
Question 69: Which two statements describe SSL proxy on SRX Series device...
Question 70: You must configure JSA to accept events from an unsupported ...
Question 71: Which three statements about SRX Series device chassis clust...
Question 72: Which two statements are true about application identificati...
Question 73: Which two statements are correct about SSL proxy server prot...
Question 74: Click the Exhibit button. (Exhibit) You have configured the ...
Question 75: What are two types of collectors for the JATP core engine? (...
Question 76: You are asked to establish an IPsec VPN between two sites. Y...
Question 77: You are deploying a vSRX into a vSphere environment which ap...
Question 78: Which two protocols are supported for Sky ATP advanced anti-...
Question 79: Which method does the loT Security feature use to identify t...
Question 80: You are asked to implement IPS on your SRX Series device. In...
Question 81: In an Active/Active chassis cluster deployment, which chassi...
Question 82: Referring to the configuration shown in the exhibit, which t...
Question 83: You want to control when cluster failovers occur. In this sc...
Question 84: Which two statements are correct about the cSRX? (Choose two...
Question 85: A client has attempted communication with a known command-an...
Question 86: Referring to the exhibit, what will the SRX Series device do...
Question 87: Which two statements are true about the fab interface in a c...
Question 88: What is the default timeout period for a TCP session in the ...
Question 89: Click the Exhibit button. You are asked to create a security...
Question 90: Click the Exhibit button. You have implemented SSL client pr...
Question 91: Which two statements describe IPS? (Choose two.)...
Question 92: You are experiencing excessive packet loss on one of your tw...
Question 93: Which two are negotiated during Phase 2 of an IPsec VPN tunn...
Question 94: You have just configured source NAT with a pool of addresses...
Question 95: Which two statements are correct about chassis clustering? (...
Question 96: Regarding dynamic attack object groups, which two statements...
Question 97: What is the default session timeout value for ICMP and UDP t...
Question 98: You must deploy AppSecure in your network to block risky app...
Question 99: You want to manually failover the primary Routing Engine in ...