Click the Exhibit button.
Referring to the exhibit, which two statements are true? (Choose two.)
A. You can secure inter-VLAN traffic with a security policy on this device.
B. You can secure intra-VLAN traffic with a security policy on this device.
C. The device can pass Layer 2 and Layer 3 traffic at the same time.
D. The device cannot pass Layer 2 and Layer 3 traffic at the same time.
Click the Exhibit button.
You are trying to implement secure wire on your SRX Series device. However, you are receiving the commit error shown in the exhibit.
What must you do to solve the problem?
A. Add the correct logical units to the interfaces in the secure wire.
B. Put the ge-0/0/4 and ge-0/0/5 interfaces in separate secure wires.
C. Change the Ethernet switching mode from access to trunk for the ge-0/0/4 and ge-0/0/5 interfaces.
D. Add the ge-0/0/4 and ge-0/0/5 interfaces to the SV VLAN.
Click the Exhibit button.
Which statement explains the current state value of the command output shown in the exhibit?
A. A valid response was received from a domain PC probe, and the user is a valid domain user programmed in the PFE.
B. An invalid response was received from a domain PC probe, and the user is an invalid domain user.
C. A probe event generated an entry in the authentication table, but no probe response has been received from the domain PC.
D. The user-to-address mapping was successfully read from the domain controller event logs, and an entry was added to the authentication table witch currently resides on the Routing Engine.
What is the required when deploying a log collector in Junos Space?
A. root user access to the log collector
B. a shared log file directory on the log collector
C. the IP address of interface eth1 on the log collector
D. a distributed deployment of the log collector nodes
Click the Exhibit button.
The UTM policy shown in the exhibit has been applied to a security policy on a branch SRX Series device. In this scenario, which statement is true?
A. HTTP downloads of ZIP files will be blocked.
B. FTP downloads of ZIP files will be blocked.
C. E-mail downloads of ZIP files will be blocked.
D. ZIP files can be renamed with a new extension to pass through the filter.
Which two parameters are required to match in an IDP rule for the terminal option to take effect? (Choose two.)
A. attacks custom-attacks
B. attacks predefined-attacks
C. application
D. source-address
SRX Series devices with AppSecure support which three custom signatures? (Choose three.)
A. MAC address-based mapping
B. latency detection mapping
C. IP protocol-based mapping
D. ICMP-based mapping
E. Layer 7-based signatures
Click the Exhibit button.
Two hosts on the same subnet are connected to an SRX340 using interfaces ge-0/0/4 and ge-0/0/5. The two hosts can communicate with each other, but they cannot communicate with hosts outside of their subnet.
Referring to the exhibit, which three actions would you take to solve this problem? (Choose three.)
A. Add the ge-0/0/4 and ge-0/0/5 interfaces to the L2 zone.
B. Remove the irb.0 interface from the L2 zone.
C. Set the SRX340 to Ethernet switching mode.
D. Configure a security policy to permit the traffic.
E. Reboot the SRX340.
Click the Exhibit button.
Referring to the exhibit, a user with IP address 10.1.1.85 generates a request that triggers the HTTP:EXT:DOT-LNK IDP signature that is a member of the "HTTP ?All" predefined attack group.
In this scenario, which statement is true?
A. The session will be closed and a reset sent to the client and server.
B. A Differentiated Services code point value of 8 will be applied.
C. No action will be taken and the attack information will be logged.
D. The session will be dropped with no reset sent to the client or server.
Click the Exhibit button.
Referring to the exhibit, the host has been automatically blocked from communicating on the network because a malicious file was downloaded. You cleaned the infected host and changed the investigation status to Resolved ?Fixed.
What does Sky ATP do if the host then attempts to download a malicious file that would result in a threat score of 10?
A. Sky ATP does not log the connection attempt and an SRX Series device does not allow the host to communicate on the network.
B. Sky ATP logs the connection attempt and an SRX Series device does not allow the host to communicate on the network.
C. Sky ATP logs the connection attempt and an SRX Series device allows the host to communicate on the network.
D. Sky ATP does not log the connection attempt and an SRX Series device allows the host to communicate on the network.