Regarding content filtering, what are two pattern lists that can be configured inthe Junos
OS? (Choose two.)
Answer : B,D
If both nodes in a chassis cluster initialize at different times, which configuration example will allow you to ensure that the node with the higher priority will become primary for your
RGs other than RG0?
Answer : A
You are required to configure a SCREEN option that enables IP source route option detection. Which two configurations meet thisrequirement? (Choose two.)
Answer : A,B
Which command would you use to enable chassis cluster on an SRX device, setting the clusterID to 1 and node to 0?
Answer : C
Which UTM feature requires a license to function?
Answer : A
After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?
Answer : D
What is the functionality of redundant interfaces (reth) in a chassis cluster?
Answer : C
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?
Answer : C
A user wants to establish an FTP session to a server behind an SRX device but must authenticate to a Web page on the SRX device for additional authentication. Which type of user authentication is configured?
Answer : B
Explanation:
Web authentication is valid for all types of traffic. With Web authentication configured, users must first directly access the Junos security platform using HTTP. The user enters the address or hostname of the device into a Web browser and then receives a prompt for a username and password. If authentication is successful, the user can then access the restricted resource directly. Subsequent traffic from the same source IP address is automatically allowed access to the restricted resource, as long as security policy allows for it.
Which zone is system-defined?
Answer : C
The Junos OS blocks an HTTP request due to a Websense server response. Which form of Web filtering is being used?
Answer : A
Click the Exhibit button.
Answer : A,C
Which statement contains the correct parameters for a route-based IPsec VPN?
Answer : D
Under which Junos hierarchy level are security policies configured?
Answer : A
Which three statements are true regarding IDP? (Choose three.)
Answer : B,C,E