Exhibit You have configured the SRX Series device to switch packets for multiple directly connected hosts that are within the same broadcast domain However, the traffic between two hosts in the same broadcast domain are not matching any security policies
Referring to the exhibit, what should you do to solve this problem?
A. You must change the global mode to security switching mode.
B. You must change the global mode to security bridging mode
C. You must change the global mode to transparent bridge mode.
D. You must change the global mode to switching mode.
You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)
A. Enroll the devices with Juniper ATP Appliance.
B. Enroll the devices with Juniper ATP Cloud.
C. Enable a third-party Tor feed.
D. Create a custom feed containing all current known MAC addresses.
You want to enforce I DP policies on HTTP traffic.
In this scenario, which two actions must be performed on your SRX Series device? (Choose two )
A. Choose an attacks type in the predefined-attacks-group HTTP-All.
B. Disable screen options on the Untrust zone.
C. Specify an action of None.
D. Match on application junos-http.
Which two modes are supported on Juniper ATP Cloud? (Choose two.)
A. global mode
B. transparent mode
C. private mode
D. Layer 3 mode
You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain. In this scenario, which solution would you choose?
A. VRF instances
B. virtual router instances
C. logical systems
D. tenant systems
Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts.
What will solve this problem?
A. Disable PAT.
B. Enable destination NAT.
C. Enable persistent NAT
D. Enable address persistence.
Click the Exhibit button.
Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)
A. Topology 3
B. Topology 5
C. Topology 2
D. Topology 4
E. Topology 1
Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds. Which two Juniper devices work in this situation? (Choose two)
A. EX Series devices
B. MX Series devices
C. SRX Series devices
D. QFX Series devices
Which two additional configuration actions are necessary for the third-party feed shown in the exhibit to work properly? (Choose two.)
A. You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.
B. You must create a dynamic address entry with the CandC category and the cc_offic365 value.
C. You must apply the dynamic address entry in a security policy.
D. You must apply the dynamic address entry in a security intelligence policy.
Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?
A. Juniper ATP Cloud
B. Juniper Secure Analytics
C. Juniper ATP Appliance
D. Juniper Security Director