Click the Exhibit button.
Referring to the configuration shown in the exhibit, which two statements are true? (Choose two.)
A. The log is being stored on the local Routing Engine.
B. The log is being sent to a remote server.
C. The syslog is configured for a user facility.
D. The syslog is configured for an info facility.
What information does JIMS collect from domain event log sources? (Choose two.)
A. For user login events, JIMS collects the username and group membership information.
B. For device login events. JIMS collects the device IP address and operating system version.
C. For device login events, JIMS collects the device IP address and machine name information.
D. For user login events, JIMS collects the login source IP address and username information.
Click the Exhibit button.
You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?
A. B. C. D.
You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers.
Which feature should you implement to satisfy this requirement?
A. SSL proxy
B. AppSecure
C. JIMS
D. JATP
Which solution should you use if you want to detect known attacks using signature-based methods?
A. SSL proxy
B. JIMS
C. IPS
D. ALGs
What are two valid JIMS event log sources? (Choose two.)
A. Microsoft Windows Server 2012 audit logs
B. Microsoft Active Directory server event logs
C. Microsoft Exchange Server event logs
D. Microsoft Active Directory audit logs
What are two types of collectors for the JATP core engine? (Choose two.)
A. SNMP
B. e-mail
C. Web
D. telemetry
You want to use Sky ATP to protect your network; however, company policy does not allow you to send any files to the cloud.
Which Sky ATP feature should you use in this situation?
A. Only use on-premises local Sky ATP server anti-malware file scanning.
B. Only use cloud-based Sky ATP file hash lookups.
C. Only use on-box SRX anti-malware file scanning.
D. Only use cloud-based Sky ATP file blacklists.
Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)
A. JIMS synchronizes Active Directory authentication information between a primary and secondary JIMS server.
B. JIMS forwards Active Directory authentication information to SRX Series client devices.
C. JIMS collects and maintains a database of authentication information from Active Directory domains.
D. JIMS replicates Active Directory authentication information to non-trusted Active Directory domain controllers.
You are deploying the Junos application firewall feature in your network.
In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)
A. destination port
B. source port
C. destination IP address
D. source IP address
After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the primary state and node0 is in the backup state. Your network standards dictate that node0 should be in the primary state.
In this scenario, which command should be used to comply with the network standards?
A. request chassis cluster failover redundancy-group 254 node 1
B. request chassis cluster failover redundancy-group 0 node 0
C. request chassis cluster failover redundancy-group 254 mode 0
D. request chassis cluster failover redundancy-group 0 node 1
You are troubleshooting advanced policy-based routing (APBR). Which two actions should you perform in this scenario? (Choose two.)
A. Verify that the APBR profiles are applied to the egress zone.
B. Verity inet.0 for correct route leaking.
C. Review the APBR statistics for matching rules and route modifications.
D. Inspect the application system cache for the application entry.
What is the correct step sequence used when Sky ATP analyzes a file?
A. static analysis -> cache lookup -> antivirus scanning -> dynamic analysis
B. cache lookup -> static analysis -> antivirus scanning -> dynamic analysis
C. cache lookup -> antivirus scanning -> static analysis -> dynamic analysis
D. dynamic analysis -> static analysis -> antivirus scanning -> cache lookup
You must deploy AppSecure in your network to block risky applications.
In this scenario, which two AppSecure features are required? (Choose two.)
A. AppFW
B. AppID
C. APBR
D. AppTrack
What are three primary functions of JATP? (Choose three.)
A. detection
B. encryption
C. optimization
D. analytics
E. mitigation