You are concerned that unauthorized traffic is using non-standardized ports on your network. In this scenario, which type of security feature should you implement?
A. Application firewall
B. Sky ATP
C. Firewall filters
D. Zone-based policies
What are configuring the antispam UTM feature on an SRX Series device. Which two actions would be performed by the SRX Series device for e-mail that is identified as spam? (Choose two.)
A. Tag the e-mail
B. Queue the e-mail
C. Block the e-mail
D. Quarantine e-mail
What are two characteristic of static NAT SRX Series devices? (Choose two.)
A. Source and destination NAT rules take precedence over static NAT rules.
B. A reverse mapping rule is automatically created for the source translation.
C. Static NAT rule take precedence over source and destination NAT rules.
D. Static rules cannot coexist with destination NAT rules on the same SRX Series device configuration.
Which two statements are true regarding zone-based security policies? (Choose two.)
A. Zone-based policies must reference a source address in the match criteria.
B. Zone-based policies must reference a URL category in the match criteria.
C. Zone-based policies must reference a destination address in the match criteria
D. Zone-based policies must reference a dynamic application in the match criteria.
Which statements about NAT are correct? (Choose two.)
A. When multiple NAT rules have overlapping match conditions, the rule listed first is chosen.
B. Source NAT translates the source port and destination IP address.
C. Source NAT translates the source IP address of packet.
D. When multiple NAT rules have overlapping match conditions, the most specific rule is chosen.
Your company has been assigned one public IP address. You want to enable internet traffic to reach multiple servers in your DMZ that are configured with private address. In this scenario, which type of NAT would be used to accomplish this tasks?
A. Static NAT
B. Destination NAT
C. Source NAT
D. NAT without PAT
What is the correct order of processing when configuring NAT rules and security policies?
A. Policy lookup > source NAT > static NAT > destination NAT
B. Source NAT > static NAT > destination NAT > policy lookup
C. Static NAT > destination NAT> policy lookup > source NAT
D. Destination NAT > policy lookup > source NAT > static NAT
Which source NAT rule set would be used when a packet matches the conditions in multiple rule sets?.
A. The most specific rule set will be used
B. The least specific rule set will be used
C. The first rule set matched will be used
D. The last rule set matched will be used
What is a type of security feed that Sky ATP provides to a vSRX series device by default?
A. CandC feeds
B. Malware feeds
C. RSS feeds
D. ACL feeds
When configuring IPsec VPNs, setting a hash algorithm solves which security concern?
A. Encryption
B. Integrity
C. Availability
D. Redundancy