Exhibit:
Referring to the exhibit, which two statements are correct?
A.
All of the entries are a threat level 8
A.
All of the entries are a threat level 8
B.
All of the entries are command and control entries.
B.
All of the entries are command and control entries.
C.
All of the entries are Dshield entries
C.
All of the entries are Dshield entries
D.
All of the entries are a threat level 10.
D.
All of the entries are a threat level 10.
Suggested answer: B, C
Explanation:
Referring to the exhibit, the following statements are correct:
B) All of the entries are command and control entries. Command and control entries are dynamic addresses that represent the IP addresses of servers that are used by malware to communicate with infected hosts. The SRX Series device can block or log the traffic to or from these IP addresses based on the security policies. The exhibit shows that all of the entries have the category DC/1, which stands for command and control1.
C) All of the entries are Dshield entries. Dshield is a feed source that provides a list of IP addresses that are associated with malicious activities, such as scanning, spamming, or attacking. The SRX
Series device can download the Dshield feed and use it to populate the dynamic address entries. The exhibit shows that all of the entries have the feed dshield, which indicates that they are from the Dshield feed source2.
The other statements are incorrect because:
A) All of the entries are not a threat level 8, but a threat level 10. The threat level is a numeric value that indicates the severity of the threat associated with a dynamic address entry. The higher the threat level, the more dangerous the threat. The SRX Series device can use the threat level to prioritize the actions for the dynamic address entries. The exhibit shows that all of the entries have the cc CN, which stands for country code China. According to the Juniper documentation, the country code China has a threat level of 10, which is the highest.
D) All of the entries are not a threat level 10, but they are. See the explanation for option A.
Reference:
Understanding Dynamic Address Categories
Understanding Dynamic Address Feed Sources
[Understanding Dynamic Address Threat Levels]
Question