Click the Exhibit button.
Referring to the configuration shown in the exhibit, which two statements are true? (Choose two.)
A. The log is being stored on the local Routing Engine.
B. The log is being sent to a remote server.
C. The syslog is configured for a user facility.
D. The syslog is configured for an info facility.
BC
//www.juniper.net/documentation/en_US/junos/topics/reference/configuration-
statement/syslog-edit-system.html
Your network uses a remote e-mail server that is used to send and receive e-mails for your users.
In this scenario, what should you do to protect users from receiving malicious files thorugh e-mail?
C
Which two statements are true about virtualized SRX Series devices? (Choose two.)
A. vSRX cannot be deployed in transparent mode.
B. cSRX can be deployed in routed mode.
C. cSRX cannot be deployed in routed mode.
D. vSRX can be deployed in transparent mode.
BD
//www.juniper.net/documentation/en_US/csrx/information-products/pathway-pages/security-
csrx-contrail-guide-pwp.pdf
A routing change occurs on an SRX Series device that involves choosing a new egress interface.
In this scenario, which statement is true for all affected current sessions?
A. The current session are torn dowm only if the policy-rematch option has been enabled.
B. The current sessions do not change.
C. The current sessions are torn down and go through first path processing based on the new route.
D. The current sessions might change based on the corresponding security policy.
B
//forums.juniper.net/t5/ScreenOS-Firewalls-NOT-SRX/Affect-of-Route-change-on-Session/m-
p/27810#M11385
What information does JIMS collect from domain event log sources? (Choose two.)
CD
Which statement describes the AppTrack module in AppSecure?
A. The AppTrack module provides enforcement with the ability to block traffic, based on specific
applications.
B. The AppTrack module provides control by the routing of traffic, based on the application.
C. The AppTrack module identifies the applications that are present in network traffic.
D. The AppTrack module provides visibility and volumetric reporting of application usage on the
network.
D
//www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-
tracking.html
Click the Exhibit button.
Which two statements describe the output shown in the exhibit? (Choose two.)
CD
Which statement is true about JATP incidents?
A
Click the Exhibit button.
You are configuring an SRX chassis cluster with the node-specific hostname and management
address. Referring to the exhibit, which configuration completes this requirement?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
C
//kb.juniper.net/InfoCenter/index?page=content&id=KB31080
You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and
ciphers.
Which feature should you implement to satisfy this requirement?
A