You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.
What would be a cause of this problem?
D
Explanation:
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/task/configuration/jatp-traffic-collectorsetting-ssh-honeypot-detection.html
You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static
NAT addresses for
the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement
DNS doctoring to
ensure remote users can access the webserver.Which two statements are true in this scenario?
(Choose two.)
B, C
The monitor traffic interface command is being used to capture the packets destined to and the from
the SRX Series device.
In this scenario, which two statements related to the feature are true? (Choose two.)
A, D
Explanation:
https://forums.juniper.net/t5/Ethernet-Switching/monitor-traffic-interface/td-p/462528
You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access
to the device
using the reverse SSH connection.Which three setting must be configured to satisfy this request?
(Choose three.)
C, D,E
Explanation:
https://kb.juniper.net/InfoCenter/index?page=content&id=TN326&cat=&actp=LIST&showDraft=false
Exhibit.
Referring to the exhibit, which two statements are true? (Choose two.)
A, C
According to the log shown in the exhibit, you notice the IPsec session is not establishing.
What is the reason for this behavior?
B
Explanation:
https://www.juniper.net/documentation/en_US/release-independent/nce/topics/example/policy-based-vpn-using-j-series-srxseries-device-configuring.html
Your organization has multiple Active Directory domain to control user access. You must ensure that
security polices are passing traffic based upon the users access rights.
What would you use to assist your SRX series devices to accomplish this task?
A
Explanation:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-configure-jims.html
Exhibit.
A hub member of an ADVPN is not functioning correctly.
Referring the exhibit, which action should you take to solve the problem?
B
Which two log format types are supported by the JATP appliance? (Choose two.)
B, C
Explanation:
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/topic-map/jatp-custom-log-ingestion.html
You have noticed a high number of TCP-based attacks directed toward your primary edge device. You
are asked to
configure the IDP feature on your SRX Series device to block this attack.
Which two IDP attack objects would you configure to solve this problem? (Choose two.)
B, C
You have designed the firewall filter shown in the exhibit to limit SSH control traffic to yours SRX
Series device without affecting other traffic.
Which two statement are true in this scenario? (Choose two.)
C, D
Explanation:
https://www.juniper.net/documentation//en_US/junos/topics/concept/firewall-filter-ex-series-evaluation-understanding.html
You issue the command shown in the exhibit.
Which policy will be active for the identified traffic?
B
Which two additional configuration actions are necessary for the third-party feed shown in the
exhibit to work properly? (Choose two.)
A, C
Click the Exhibit button.
Which type of NAT is shown in the exhibit?
B
Click the Exhibit button.
Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)
ADE
Explanation:
Reference:
https://www.juniper.net/documentation/en_US/junos-space17.2/policy-enforcer/topics/concept/policy-enforcer-deployment-supported-topologies.html