ExamGecko
Question list
Search
Search

List of questions

Search

Question 74 - JN0-335 discussion

Report
Export

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

A.
Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.
Answers
A.
Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.
B.
Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.
Answers
B.
Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.
C.
Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.
Answers
C.
Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.
D.
Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.
Answers
D.
Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.
Suggested answer: C

Explanation:

The exhibit shows a configuration snippet for security intelligence on an SRX Series device. Security intelligence is a feature that allows you to block or monitor traffic from malicious sources based on threat intelligence feeds from Juniper ATP Cloud or other providers. The configuration defines a profile for ATP Infected-Hosts, which is a feed that contains IP addresses of hosts that are infected with malware and communicate with command-and-control servers. The configuration also defines a rule for threat level 8, which is a parameter that indicates the severity of the threat. Based on this configuration, the SRX Series device will do the following:

Packets from the infected hosts with a threat level of 8 or above will be dropped: The action block-and-drop under the rule means that the device will block any traffic from the infected hosts that have a threat level equal to or higher than 8. This will prevent the hosts from sending or receiving malicious commands or data.

No log message will be generated: The absence of any log option under the rule means that the device will not generate any log message for the blocked traffic. This may reduce the load on the device and the logging server, but it may also limit the visibility and analysis of the security events.

asked 18/09/2024
Jonaid Alam
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first