You want to automatically generate the encryption and authentication keys during IPsec VPN
establishment.
What would be used to accomplish this task?
A. IPsec
B. Diffie_Hellman
C. Main mode
D. Aggregate mode
You are configuring an IPsec VPN tunnel between two location on your network. Each packet must be
encrypted and authenticated.
Which protocol would satisfy these requirements?
A. MD5
B. ESP
C. AH
D. SHA
What are the valid actions for a source NAT rule in J-Web? (choose three.)
A. On
B. Off
C. Pool
D. Source
E. interface
The Sky ATP premium or basic-Threat Feed license is needed fort which two features? (Choose two.)
A. Outbound protection
B. CandC feeds
C. Executable inspection
D. Custom feeds
Which type of NAT is performed by the SRX Series device?
A. Source NAT with PAT
B. Source Nat without PAT
C. Destination NAT without PAT
D. Destination NAT with PAT
Which two statements are true about security policy actions? (Choose two.)
A. The reject action drops the traffic and sends a message to the source device.
B. The deny action silently drop the traffic.
C. The deny action drops the traffic and sends a message to the source device.
D. The reject action silently drops the traffic.
You want to generate reports from the l-Web on an SRX Series device. Which logging mode would you use in this scenario?
A. Syslog
B. Stream
C. Event
D. local
Which two statements are true about UTM on an SRX340? (Choose two.)
A. A default UTM policy is created.
B. No default profile is created.
C. No default UTM policy is created
D. A default UTM profile is created
You configure and applied several global policies and some of the policies have overlapping match criteria.
A. In this scenario, how are these global policies applies?
B. The first matched policy is the only policy applied.
C. The most restrictive that matches is applied.
D. The least restrictive policy that matches is applied.
Which two statements are correct about functional zones? (Choose two.)
A. A functional zone uses security policies to enforce rules for transit traffic.
B. Traffic received on the management interface in the functional zone cannot transit out other interface.
C. Functional zones separate groups of users based on their function.
D. A function is used for special purpose, such as management interface