최신 JN0-334 무료덤프 - Juniper Security, Specialist (JNCIS-SEC)
Where is AppSecure executed in the flow process on an SRX Series device?
정답: C
What are two elements of a custom IDP/IPS attack object? (Choose two.)
정답: A,B
Which two statements apply to policy scheduling? (Choose two.)
정답: C,D
Data plane logging operates in which two modes? (Choose two.)
정답: B,D
Click the Exhibit button.
Referring to the exhibit, which statement is true?
Referring to the exhibit, which statement is true?
정답: A
You are asked to improve resiliency for individual redundancy groups in an SRX4600 chassis cluster.
Which two features would accomplish this task? (Choose two.)
Which two features would accomplish this task? (Choose two.)
정답: B,D
What are two valid JIMS event log sources? (Choose two.)
정답: B,D
Click the Exhibit button.
You have configured the scheduler shown in the exhibit to prevent users from accessing certain websites from 1:00 PM to 3:00 PM Monday through Friday. This policy will remain in place until further notice. When testing the policy, you determine that the websites are still accessible during the restricted times.
In this scenario, which two actions should you perform to solve the problem? (Choose two.)
You have configured the scheduler shown in the exhibit to prevent users from accessing certain websites from 1:00 PM to 3:00 PM Monday through Friday. This policy will remain in place until further notice. When testing the policy, you determine that the websites are still accessible during the restricted times.
In this scenario, which two actions should you perform to solve the problem? (Choose two.)
정답: B,D
You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic.
Which two parameters are required to accomplish this task? (Choose two.)
Which two parameters are required to accomplish this task? (Choose two.)
정답: B,C