What are two management methods for cSRX? (Choose two.)
Answer : BC
You are deploying the Junos application firewall feature in your network.
In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)
Answer : AC
Which two protocols are supported for Sky ATP advanced anti-malware scanning? (Choose two.)
Answer : CD
Click the Exhibit button.
Answer : BD
You are asked to convert two standalone SRX Series devices to a chassis cluster deployment. You must ensure that your IPsec tunnels will be compatible with the new deployment.
In this scenario, which two interfaces should be used when binding your tunnel endpoints? (Choose two.)
Answer : BD
Which two session parameters would be used to manage space on the session table? (Choose two.)
Answer : AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-flow-based-session-for-srx-series-devices.html
Click the Exhibit button.
Answer : AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-idp-policies-overview.html
Click the Exhibit button.
Answer : AB
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/schedulers-edit-scheduler.html
After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the primary state and node0 is in the backup state. Your network standards dictate that node0 should be in the primary state.
In this scenario, which command should be used to comply with the network standards?
Answer : B
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-redundancy-group-failover.html
Click the Exhibit button.
Answer : AB
Which two statements describe superflows in Juniper Secure Analytics? (Choose two.)
Answer : CD
Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)
Answer : ABC
Reference:
https://www.juniper.net/documentation/en_US/day-one-books/topics/concept/juniper-vsrx-versus-csrx.html
You are deploying a vSRX into a vSphere environment which applies the configuration from a bootable ISO file containing the juniper.conf file. After the vSRX boots and has the configuration applied, you make additional device specific configuration changes, commit, and reboot the device. Once the device finishes rebooting, you notice the specific changes you made are missing but the original configuration is applied.
In this scenario, what is the problem?
Answer : D
Reference:
https://www.juniper.net/documentation/us/en/software/vsrx/vsrx-kvm/topics/task/security-vsrx-kvm-bootstrap-config.html
When working with network events on a Juniper Secure Analytics device, flow records come from which source?
Answer : B
Reference:
https://www.juniper.net/documentation/en_US/jsa7.3.1/jsa-arch-deployment-guide/topics/concept/jsa-ad-jsa-events-and-flows.html
You are troubleshooting advanced policy-based routing (APBR).
Which two actions should you perform in this scenario? (Choose two.)
Answer : CD