Juniper JN0-335 Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which two statements about unified security policies are correct? (Choose two.)
Question 22

Exhibit
Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
Question 23

You have deployed an SRX300 Series device and determined that files have stopped being scanned.
In this scenario, what is a reason for this problem?
Question 24

Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Question 25

Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
Question 26

You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
Question 27

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?
Question 28

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
Question 29

You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?
Question 30

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
Question