Juniper JN0-335 Practice Test - Questions Answers, Page 3
List of questions
Question 21
Which two statements about unified security policies are correct? (Choose two.)
Question 22
Exhibit
Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
Question 23
You have deployed an SRX300 Series device and determined that files have stopped being scanned.
In this scenario, what is a reason for this problem?
Question 24
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Question 25
Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
Question 26
You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
Question 27
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?
Question 28
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
Question 29
You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?
Question 30
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
Question