You are asked to deploy a security solution in your data center that ensures all traffic flows through the SRX Series devices.
Which firewall deployment method meets this requirement?
A. one-arm
B. two-arm
C. transparent
D. inline
You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs.
Which two statements are correct in this scenario? (Choose two.)
A. Distributed ISGs typically have less latency compared to centralized ISGs
B. Distributed ISGs reduce bandwidth for end users
C. Distributed ISGs typically require extra bandwidth for management
D. Distributed ISGs are harder to manage compared to centralized ISGs
You are concerned about users downloading malicious attachments at work while using encrypted Web mail. You want to block these malicious files using your SRX Series device.
In this scenario, which two features should you use? (Choose two.)
A. SSL reverse proxy
B. SSL forward proxy
C. Sky ATP SMTP scanning
D. Sky ATP HTTP scanning
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.
In this scenario, what is the minimum number of log receiver devices that you should use?
A. 4
B. 3
C. 2
D. 1
Your customer needs help designing a single solution to protect their combination of various Junos network devices from unauthorized management access.
Which Junos OS feature will provide this protection?
A. Use a firewall filter applied to the fxp0 interface
B. Use a security policy with the destination of the junos-host zone
C. Use the management zone host-inbound-traffic feature
D. Use a firewall filter applied to the lo0 interface
Your customer is getting ready to deploy a new WAN architecture. It must be simple to set up, address hub scaling concerns, and allow the automatic addition of new sites without requiring changes to the hub site. They want to deploy either AutoVPN or Auto Discovery VPN.
In this scenario, why would you propose Auto Discovery VPN as a solution?
A. Your customer requires direct spoke-to-spoke communication
B. OSPF support is required
C. Only Auto Discovery VPN supports the automatic addition of valid spokes
D. Your customer needs to configure the hub site only once
You have a campus location with multiple WAN links. You want to specify the primary link used for your VoIP traffic.
In this scenario, which type of WAN load balancing would you use?
A. BGP
B. OSPF
C. FBF
D. ECMP
Which two protocols are supported natively by the Junos automation stack? (Choose two.)
A. NETCONF
B. PyEZ
C. Jenkins
D. CIP
You are concerned about users attacking the publicly accessible servers in your data center through encrypted channels. You want to block these attacks using your SRX Series devices.
In this scenario, which two features should you use? (Choose two.)
A. Sky ATP
B. IPS
C. SSL forward proxy
D. SSL reverse proxy
You are creating a security design proposal for a customer who is connecting their headquarters to a remote branch site over an unsecured Internet connection. As part of your design, you must recommend a solution to connect these sites together and ensure that the communication is secured and encrypted.
In this scenario, which solution do you recommend?
A. GRE
B. XMPP
C. IPsec
D. MPLS