Juniper JN0-335 Practice Test - Questions Answers, Page 3
List of questions
Related questions
Which two statements about unified security policies are correct? (Choose two.)
Exhibit
Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
You have deployed an SRX300 Series device and determined that files have stopped being scanned.
In this scenario, what is a reason for this problem?
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?
Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?
Question