Your customer is planning the deployment of a new hub-and-spoke WAN architecture that must support dual stack They have decided against using a dynamic routing protocol. They are concerned about the difficulty of managing configurations and operations at the hub location as they deploy branch routers
In this scenario, what ate three reasons for selecting route-based VPNs with traffic selectors'? (Choose three)
Answer : A,D,E
Your company's IT policy restricts general access to recruitment websites from within the corporate network However, the human resources department requires access to these sites.
Which two features accomplish this goal? (Choose two)
Answer : A,D
What are two design requirements for deploying a chassis cluster across a Layer 2 network? (Choose two)
Answer : A,B
You must implement access control lists to protect the control plane of a service provider's core devices What are two ways to accomplish this task? (Choose two.)
Answer : B,C
You need to provide wireless access to the user community without reducing security.
Which action accomplishes this task?
Answer : C
What is the maximum number of SRX Series devices in a chassis cluster?
Answer : A
A client wants to deploy a vSRX chassis cluster across two existing ESXi hosts without changing the external switch configuration Which two actions must you perform to meet this requirement? (Choose two.)
Answer : A,C
You are designing a network management solution for a customer's data center Your design must include a solution that supports the collection of events from SRX Series devices, as well as events from various third-party devices.
In this scenario, which solution should you recommend"?
Answer : A
You must design a solution to collect logs from a group of SRX Series devices using Junos
Space Log Director You will deploy this solution on virtual machines that How would you accomplish this task?
Answer : D
Which three statements are correct about BGP flowspec? (Choose three.)
Answer : A,D,E
Your company is migrating an existing enterprise application lo use TLS The application is written in PHP and must have IPS protection Which two actions will ensure that the application is protected on an SRX5400? (Choose two.)
Answer : C,D
You are asked to deploy security in your data center with the criteria listed below
-The deployment must allow for selective firewall redirect -The deployment must allow (or selective firewall bypass
Which deployment meets these requirements?
Answer : C
Which solution centralizes the management of security devices in your data center?
Answer : C
Spotlight Secure provides which benefit?
Answer : C
You are designing an IPsec VPN solution for a customer with the requirements shown below:
-It must be scalable
-It must support VoIP traffic with minimal latency
-It must allow remote locations to be added to the VPN topology with minimal effort and in a secure way
Which solution meets these requirements?
Answer : B