Exam 5: Automation and DevOps, Associate

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which zone is considered a functional zone?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

Which two statements are correct about using global-based policies over zone-based policies? (Choose two.)

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B,D

What must you do first to use the Monitor/Events workspace in the J-Web interface?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

When configuring IPsec VPNs, setting a hash algorithm solves which security concern?

(Multiple Choice)
5.0/5
(33)

Which two statements are correct about global security policies? (Choose two.)

(Multiple Choice)
4.7/5
(39)

Which feature is used when you want to permit traffic on an SRX Series device only at specific times?

(Multiple Choice)
4.7/5
(32)

Click the Exhibit button. Click the Exhibit button.   Referring to the exhibit, which statement is true? Referring to the exhibit, which statement is true?

(Multiple Choice)
4.7/5
(32)

Which two statements are true about virtualized SRX Series devices? (Choose two.)

(Multiple Choice)
4.9/5
(28)

Users in your network are downloading files with file extensions that you consider to be unsafe for your network. You must prevent files with specific file extensions from entering your network. Which UTM feature should be enabled on an SRX Series device to accomplish this task?

(Multiple Choice)
4.9/5
(33)

Click the Exhibit button. Click the Exhibit button.   You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement? You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

(Multiple Choice)
4.9/5
(39)

Which feature supports sandboxing of zero-day attacks?

(Multiple Choice)
4.9/5
(35)

On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a branch office using a dynamic IP address?

(Multiple Choice)
4.8/5
(28)

Click the Exhibit button. Click the Exhibit button.   Referring to the exhibit, which statement is true? Referring to the exhibit, which statement is true?

(Multiple Choice)
4.9/5
(28)

Which statement is true about JATP incidents?

(Multiple Choice)
4.9/5
(39)

Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)

(Multiple Choice)
4.9/5
(34)

Which statement describes the AppTrack module in AppSecure?

(Multiple Choice)
4.9/5
(28)

Click the Exhibit button. Click the Exhibit button.   Users should not have access to Facebook, however, a recent examination of the security logs show that users are accessing Facebook. Referring to the exhibit, what should you do to solve this problem? Users should not have access to Facebook, however, a recent examination of the security logs show that users are accessing Facebook. Referring to the exhibit, what should you do to solve this problem?

(Multiple Choice)
4.9/5
(39)

The AppQoE module of AppSecure provides which function?

(Multiple Choice)
4.9/5
(26)

You must block the lateral spread of Remote Administration Tools (RATs) that use SMB to propagate within the network, using the JATP solution. Which action would accomplish this task?

(Multiple Choice)
4.8/5
(28)

What are two valid JIMS event log sources? (Choose two.)

(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 79
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)