Exam 5: Automation and DevOps, Associate

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which UTM feature uses MIME pattern filters to identify traffic in HTTP and e-mail protocols?

(Multiple Choice)
4.8/5
(36)

Which statement describes stateless firewalls on SRX Series devices?

(Multiple Choice)
4.8/5
(25)

Which solution should you use if you want to detect known attacks using signature-based methods?

(Multiple Choice)
4.9/5
(29)

Which statement is correct about IKE?

(Multiple Choice)
4.8/5
(36)

Click the Exhibit button. Click the Exhibit button.   Which two statements are true about the configuration shown in the exhibit? (Choose two.) Which two statements are true about the configuration shown in the exhibit? (Choose two.)

(Multiple Choice)
4.8/5
(32)

Which type of security policy protects restricted services from running on non-standard ports?

(Multiple Choice)
4.9/5
(35)

What is the definition of a zone on an SRX Series device?

(Multiple Choice)
4.9/5
(40)

What is the default session timeout value for ICMP and UDP traffic?

(Multiple Choice)
4.7/5
(34)

You want to use Sky ATP to protect your network; however, company policy does not allow you to send any files to the cloud. Which Sky ATP feature should you use in this situation?

(Multiple Choice)
4.7/5
(43)

What is the default timeout period for a TCP session in the session table of a Junos security device?

(Multiple Choice)
4.9/5
(42)

You have deployed JSA and you need to view events and network activity that match rule criteria. You must view this data using a single interface. Which JSA feature should you use in this scenario?

(Multiple Choice)
4.7/5
(36)

Which security log message format reduces the consumption of CPU and storage?

(Multiple Choice)
4.8/5
(39)

Your company has been assigned one public IP address. You want to enable Internet traffic to reach multiple servers in your DMZ that are configured with private IP addresses. In this scenario, which type of NAT would be used to accomplish this task?

(Multiple Choice)
4.8/5
(34)

Click the Exhibit button. Click the Exhibit button.   You have implemented SSL proxy client protection. After implementing this feature, your users are complaining about the warning message shown in the exhibit. Which action must you perform to eliminate the warning message? You have implemented SSL proxy client protection. After implementing this feature, your users are complaining about the warning message shown in the exhibit. Which action must you perform to eliminate the warning message?

(Multiple Choice)
4.8/5
(22)

Click the Exhibit button. Click the Exhibit button.   The output shown in the exhibit is displayed in which format? The output shown in the exhibit is displayed in which format?

(Multiple Choice)
4.9/5
(29)

What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?

(Multiple Choice)
4.8/5
(31)

Click the Exhibit button. Click the Exhibit button.   Which two statements describe the output shown in the exhibit? (Choose two.) Which two statements describe the output shown in the exhibit? (Choose two.)

(Multiple Choice)
4.9/5
(26)

Which two statements are true about security policies in the factory-default configuration of an SRX340? (Choose two.)

(Multiple Choice)
4.8/5
(32)

Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)

(Multiple Choice)
4.9/5
(44)

What is the purpose of the Shadow Policies workspace in J-Web?

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 79
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)