What are two examples of RTOs? (Choose two.)
A. IPsec SA entries
B. session table entries
C. fabric link probes
D. control link heartbeats
Which two statements describe client-protection SSL proxy on an SRX Series device? (Choose two.)
A. The server-protection SSL proxy intercepts the server certificate.
B. The server-protection SSL proxy is also known as SSL reverse proxy.
C. The server-protection SSL proxy forwards the server certificate after modification.
D. The server-protection SSL proxy acts as the server from the client's perspective.
Which two statements are true about virtualized SRX Series devices? (Choose two.)
A. vSRX cannot be deployed in transparent mode.
B. cSRX can be deployed in routed mode.
C. cSRX cannot be deployed in routed mode.
D. vSRX can be deployed in transparent mode.
You are asked to enable AppTrack to monitor application traffic from hosts in the User zone destined to hosts in the Internet zone.
In this scenario, which statement is true?
A. You must enable the AppTrack feature within the Internet zone configuration.
B. You must enable the AppTrack feature within the ingress interface configuration associated with the Internet zone.
C. You must enable the AppTrack feature within the interface configuration associated with the User zone.
D. You must enable the AppTrack feature within the User zone configuration.
The DNS ALG performs which three functions? (Choose three.)
A. The DNS ALG performs the IPv4 and IPv6 address transformations.
B. The DNS ALG performs DNS doctoring.
C. The DNS ALG modifies the DNS payload in NAT mode.
D. The DNS ALG performs DNSSEC.
E. The DNS ALG performs DNS load balancing.
When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)
A. A security policy can reference both a client-protection SSL proxy profile and a server-protection proxy profile.
B. If you apply an SSL proxy profile to a security policy and forget to apply any Layer7 services to the security policy, any encrypted traffic that matches the security policy is not decrypted.
C. A security policy can only reference a client-protection SSL proxy profile or a server-protection SSL proxy profile.
D. If you apply an SSL proxy profile to a security policy and forget to apply any Layer7 services to the security policy, any encrypted traffic that matches the security policy is decrypted.
Click the Exhibit button.
Referring to the SRX Series flow module diagram shown in the exhibit, where is IDP/IPS processed?
A. Forwarding Lookup
B. Services ALGs
C. Screens
D. Security Policy
You want to collect events and flows from third-party vendors. Which solution should you deploy to accomplish this task?
A. Log Director
B. JSA
C. Policy Enforcer
D. Contrail
Which two statements describe JSA? (Choose two.)
A. Security Director must be used to view third-party events rom JSA flow collectors.
B. JSA supports events and flows from Junos devices, including third-party devices.
C. JSA events must be manually imported into Security Directory using an SSH connection.
D. JSA can be used as a log node with Security Director or as a standalone solution.
What are three primary functions of JATP? (Choose three.)
A. detection
B. encryption
C. optimization
D. analytics
E. mitigation