You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.
Which two statements are correct in this scenario about the control-link settings? (Choose two.)
What are two types of system logs that Junos generates? (Choose two.)
Which two statements are true about Juniper ATP Cloud? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
You want to be alerted if the wrong password is used more than three times on a single device within five minutes.
Which Juniper Networks solution will accomplish this task?
Which two statements are correct about Juniper ATP Cloud? (Choose two.)
Click the Exhibit button.
Referring to the exhibit, what will the SRX Series device do in this configuration?
Click the Exhibit button.
Which two statements describe the output shown in the exhibit? (Choose two.)
Which two statements about SRX Series device chassis clusters are true? (Choose two.)
Which two statements are true about mixing traditional and unified security policies? (Choose two.)
What are two benefits of using a vSRX in a software-defined network? (Choose two.)
Exhibit
You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.
Which statement is correct in this scenario?
You want to set up JSA to collect network traffic flows from network devices on your network.
Which two statements are correct when performing this task? (Choose two.)
You have deployed an SRX300 Series device and determined that files have stopped being scanned.
In this scenario, what is a reason for this problem?
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
Which two statements are true about the vSRX? (Choose two.)
Which two statements are true about Juniper ATP Cloud? (Choose two.)
Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)
Exhibit
Referring to the exhibit which statement is true?
You want to use IPS signatures to monitor traffic.
Which module in the AppSecure suite will help in this task?
You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows.
In this scenario, which two statements are correct? (Choose two.)
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.
In this scenario, what is the correct order for rebooting the devices?
Which two statements are correct about a reth LAG? (Choose two.)
You are asked to create an IPS-exempt rule base to eliminate false positives from happening.
Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)
Exhibit
You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.
Which two commands would add this functionality to the FindThreat policy? (Choose two.)
A)
B)
C)
D)
On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)
After JSA receives external events and flows, which two steps occur? (Choose two.)