You are configuring a client-protection SSL proxy profile.
Which statement is correct in this scenario?
정답:
Question No : 6
You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers.
Which feature should you implement to satisfy this requirement?
정답:
Question No : 7
Which default protocol and port are used for JIMS to SRX client communication?
You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?
A)
Which two statements are true about the configuration shown in the exhibit? (Choose two.)
정답:
Question No : 13
You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic.
Which two parameters are required to accomplish this task? (Choose two.)
정답:
Question No : 14
You are deploying the Junos application firewall feature in your network.
In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)
정답:
Question No : 15
Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)