Which default protocol and port are used for JIMS to SRX client communication?
C
Reference:
https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-
certificate-configuring.html#:~:text=By%20default%2C%20the%20HTTPS%20port%20is%20443.&text=The%20JI
MS% 20server%20communicates%20with,Firewall%20to%20allow%20this%20communication
Click the Exhibit button.
You have deployed Sky ATP to protect your network from attacks so that users are unable to
download malicious files. However, after a user attempts to download a malicious file, they are still
able to communicate through the SRX Series device.
Referring to the exhibit, which statement is correct?
C
Which two statements apply to policy scheduling? (Choose two.)
BC
Reference:
https://www.juniper.net/documentation/en_US/cso5.4.0/topics/concept/cp-about-schedule-overview.html
Click the Exhibit button.
Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values
configured on the SRX client? (Choose two.)
BC
Reference:
https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-srx-configuring.html
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
AC
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-ssl-tls.html
You are troubleshooting advanced policy-based routing (APBR).
Which two actions should you perform in this scenario? (Choose two.)
CD
When working with network events on a Juniper Secure Analytics device, flow records come from
which source?
B
Reference:
https://www.juniper.net/documentation/en_US/jsa7.3.1/jsa-arch-deployment-guide/topics/concept/jsa-ad-jsa-events-and-flows.html
You are deploying a vSRX into a vSphere environment which applies the configuration from a
bootable ISO file containing the juniper.conf file. After the vSRX boots and has the configuration
applied, you make additional device specific configuration changes, commit, and reboot the device.
Once the device finishes rebooting, you notice the specific changes you made are missing but the
original configuration is applied.
In this scenario, what is the problem?
D
Reference:
https://www.juniper.net/documentation/us/en/software/vsrx/vsrx-kvm/topics/task/security-vsrx-kvm-bootstrap-config.html
Which three statements are true about the difference between cSRX-based virtual security
deployments and vSRX-based virtual security deployments? (Choose three.)
ABC
Reference:
https://www.juniper.net/documentation/en_US/day-one-books/topics/concept/juniper-vsrx-versus-csrx.html
Which two statements describe superflows in Juniper Secure Analytics? (Choose two.)
CD
Click the Exhibit button.
Which two statements are true about the session shown in the exhibit? (Choose two.)
AB
After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the
primary state and node0 is in the backup state. Your network standards dictate that node0 should be
in the primary state.
In this scenario, which command should be used to comply with the network standards?
B
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-redundancy-group-failover.html
Click the Exhibit button.
You have configured the scheduler shown in the exhibit to prevent users from accessing certain
websites from 1:00 PM to 3:00 PM Monday through Friday. This policy will remain in place until
further notice. When testing the policy, you determine that the websites are still accessible during
the restricted times.
In this scenario, which two actions should you perform to solve the problem? (Choose two.)
AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/schedulers-edit-scheduler.html
Click the Exhibit button.
You examine the log file shown in the exhibit after running the set security idp active-policy
command.
Which two statements are true in this scenario? (Choose two.)
AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-idp-policies-overview.html
Which two session parameters would be used to manage space on the session table? (Choose two.)
AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-flow-based-session-for-srx-series-devices.html