Your network includes SRX Series devices at the headquarters location. The SRX Series devices at this location are part of a high availability chassis cluster and are configured for IPS. There has been a node failover.
In this scenario, which statement is true?
A. Existing sessions continue to be processed by IPS because of table synchronization.
B. Existing sessions are no longer processed by IPS and become firewall sessions.
C. Existing session continue to be processed by IPS as long as GRES is configured.
D. Existing sessions are dropped and must be reestablished so IPS processing can occur.
You need to add all of the sites in the domain example.com to urllist2. You decide to use wildcards to account for any changes made to the domain in the future.
In this scenario, which two commands would you use to meet this requirement? (Choose two.)
A. set custom-objects url-pattern urllist2 value http://*.example.com
B. set custom-objects url-pattern urllist2 value http://*example.com
C. set custom-objects url-pattern urllist2 value http://*.example.???
D. set custom-objects url-pattern urllist2 value http://*.example.*
You have configured a log collector VM and Security Director. System logging is enabled on a branch SRX Series device, but security logs do not appear in the monitor charts.
How would you solve this problem?
A. Configure a security policy to forward logs to the collector.
B. Configure application identification on the SRX Series device.
C. Configure security logging on the SRX Series device.
D. Configure J-Flow on the SRX Series device.
Click the Exhibit button.
Referring to the exhibit, you have expanded the disk storage size in ESXi for your log collector from 500 GB to 600 GB. However, your log collector's disk size has not changed.
Given the scenario, which two statements are true? (Choose two.)
A. You must run a script from the console to expand the disk size.
B. The ESXi storage parameter is not associated with the Elasticsearch disk size parameter.
C. You must reboot the log collector for storage settings to be updated
D. You must re-run the log collector setup script to update the storage settings.
What is the required when deploying a log collector in Junos Space?
A. root user access to the log collector
B. a shared log file directory on the log collector
C. the IP address of interface eth1 on the log collector
D. a distributed deployment of the log collector nodes
Click the Exhibit button.
The UTM policy shown in the exhibit has been applied to a security policy on a branch SRX Series device. In this scenario, which statement is true?
A. HTTP downloads of ZIP files will be blocked.
B. FTP downloads of ZIP files will be blocked.
C. E-mail downloads of ZIP files will be blocked.
D. ZIP files can be renamed with a new extension to pass through the filter.
SRX Series devices with AppSecure support which three custom signatures? (Choose three.)
A. MAC address-based mapping
B. latency detection mapping
C. IP protocol-based mapping
D. ICMP-based mapping
E. Layer 7-based signatures
After downloading the new IPS attack database, the installation of the new database fails. What caused this condition?
A. The new attack database no longer contained an attack entry that was in use.
B. The new attack database was revoked between the time it was downloaded and installed.
C. The new attack database was too large for the device on which it was being installed.
D. Some of the new attack entries were already in use and had to be deactivated before installation.
Click the Exhibit button.
Referring to the security policy shown in the exhibit, which two actions will happen as the packet is processed? (Choose two.)
A. It passes unmatched traffic after modifying the DSCP priority.
B. It marks and passes matched traffic with a high DSCP priority.
C. It marks and passes matched traffic with a low DSCP priority.
D. It passes unmatched traffic without modifying DSCP priority.
You are using the integrated user firewall feature on an SRX Series device.
Which three parameters are stored in the Active Directory authentication table? (Choose three.)
A. IP address
B. MAC address
C. group mapping
D. username
E. password