Multiple Choice
Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)
A) When a rule is triggered, JSA can respond by sending an e-mail to JSA administrators.
B) Rules are defined on Junos Space Security Director, and then pushed to JSA log collectors.
C) A rule defines matching criteria and actions that should be taken when an events matches the rule.
D) When a rule is triggered, JSA can respond by blocking all traffic from a specific source address.
Correct Answer:

Verified
Correct Answer:
Verified
Q10: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1585/.jpg" alt="Click
Q11: Which feature supports sandboxing of zero-day attacks?<br>A)
Q12: On an SRX Series device, how should
Q13: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1585/.jpg" alt="Click
Q14: Which statement is true about JATP incidents?<br>A)
Q16: Which statement describes the AppTrack module in
Q17: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1585/.jpg" alt="Click
Q18: The AppQoE module of AppSecure provides which
Q19: You must block the lateral spread of
Q20: What are two valid JIMS event log