A) Site-to-Site VPN
B) Hub-and-Spoke VPN
C) AutoVPN
D) Group VPN
Correct Answer
verified
Multiple Choice
A) vMX
B) vSRX
C) cSRX
D) CTP Series
Correct Answer
verified
Multiple Choice
A) Sky ATP
B) UTM antivirus
C) IPS
D) JATP
Correct Answer
verified
Multiple Choice
A) GRE
B) XMPP
C) IPsec
D) MPLS
Correct Answer
verified
Multiple Choice
A) telemetry with an SDN controller
B) JFlow traffic monitoring with event scripts
C) VNF security devices deployed on x86 servers
D) VRF segmentation on high-capacity physical security appliances
Correct Answer
verified
Multiple Choice
A) SaltStack
B) Ansible
C) Puppet
D) Chef
Correct Answer
verified
Multiple Choice
A) EVPN over IPsec
B) one-to-one NAT
C) stacked VLAN tagging
D) endpoint independent mapping
Correct Answer
verified
Multiple Choice
A) BGP
B) OSPF
C) FBF
D) ECMP
Correct Answer
verified
Multiple Choice
A) Deploy a vSRX cluster in front of each customer's servers while keeping the physical firewall cluster
B) Deploy a software-defined networking solution
C) Remove the physical firewall cluster and deploy vSRX clusters dedicated to each customer's servers
D) Replace the physical firewall cluster with a higher-performance firewall
Correct Answer
verified
Multiple Choice
A) Intrazone Permit
B) trust but verify
C) user-role firewall policies
D) Zero Trust
Correct Answer
verified
Multiple Choice
A) 2
B) 3
C) 4
D) 5
Correct Answer
verified
Multiple Choice
A) full logical systems capabilities
B) stateful firewall protection at the tenant edge
C) 100GbE interface support
D) OSPFv3 capabilities
Correct Answer
verified
Multiple Choice
A) cSRX loads faster
B) cSRX uses less memory
C) cSRX supports the BGP protocol
D) cSRX supports IPsec
Correct Answer
verified
Multiple Choice
A) telemetry with an SDN controller
B) JFlow traffic monitoring with event scripts
C) VNF security devices deployed on x86 servers
D) VRF segmentation on high-capacity physical security appliances
Correct Answer
verified
Multiple Choice
A) Modify the IPsec proposal from AES-128 to AES-256
B) Change the IGP from OSPF to IS-IS
C) Migrate to IKE version 2
D) Implement Auto Discovery VPN
Correct Answer
verified
Multiple Choice
A) Implement a certificate-based VPN using a public key infrastructure (PKI)
B) Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C) Use firewall filters to block traffic from the stolen VPN router
D) Rotate VPN pre-shared keys every month
Correct Answer
verified
Multiple Choice
A) segmentation
B) intra-data center policy enforcement
C) perimeter protection
D) compliance
Correct Answer
verified
Multiple Choice
A) Use a firewall filter applied to the fxp0 interface
B) Use a security policy with the destination of the junos-host zone
C) Use the management zone host-inbound-traffic feature
D) Use a firewall filter applied to the lo0 interface
Correct Answer
verified
Multiple Choice
A) IDP
B) Sky ATP
C) JSA
D) JATP
Correct Answer
verified
Multiple Choice
A) Propose active/active cluster deployment with separate redundancy groups
B) Propose active/passive cluster deployment with separate redundancy groups
C) Propose active/active cluster deployment without separate redundancy groups
D) Propose active/passive cluster deployment without separate redundancy groups
Correct Answer
verified
Showing 1 - 20 of 69
Related Exams