Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)
You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.
Which two statements are correct in this scenario about the control-link settings? (Choose two.)
Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)
You want to be alerted if the wrong password is used more than three times on a single device within five minutes.
Which Juniper Networks solution will accomplish this task?
Regarding static attack object groups, which two statements are true? (Choose two.)
Which sequence does an SRX Series device use when implementing stateful session security policies using Layer 3 routes?
Exhibit
Which two statements are correct about the configuration shown in the exhibit? (Choose two.)
Your manager asks you to provide firewall and NAT services in a private cloud.
Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)
Your JIMS server is unable to view event logs.
Which two actions would you take to solve this issue? (Choose two.)
Which two statements about SRX Series device chassis clusters are true? (Choose two.)
You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?
Which two statements about SRX Series device chassis clusters are correct? (Choose two.)
Which two statements about unified security policies are correct? (Choose two.)
Exhibit
Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
Exhibit
Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?
When a security policy is modified, which statement is correct about the default behavior for active sessions allowed by that policy?
On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)
Exhibit
You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.
Which two commands would add this functionality to the FindThreat policy? (Choose two.)
A)
B)
C)
D)
You are asked to create an IPS-exempt rule base to eliminate false positives from happening.
Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)
After JSA receives external events and flows, which two steps occur? (Choose two.)