Which two statements are true about application identification? (Choose two.)
Which two statements are correct about SSL proxy server protection? (Choose two.)
Exhibit
Referring to the exhibit, what do you determine about the status of the cluster.
Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)
You want to control when cluster failovers occur.
In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)
Exhibit
You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.
Which two commands would add this functionality to the FindThreat policy? (Choose two.)
A)
B)
C)
D)
You want to use IPS signatures to monitor traffic.
Which module in the AppSecure suite will help in this task?
Click the Exhibit button.
You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.
How do you solve this problem?
Regarding static attack object groups, which two statements are true? (Choose two.)
Which statement defines the function of an Application Layer Gateway (ALG)?
Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.
Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?
Exhibit
Which two statements are correct about the configuration shown in the exhibit? (Choose two.)
Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Click the Exhibit button.
Referring to the exhibit, what will the SRX Series device do in this configuration?
Exhibit
When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)
You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.
In this scenario, what is the correct order for rebooting the devices?
Which method does the loT Security feature use to identify traffic sourced from IoT devices?
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?