ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 63 - JN0-636 discussion

Report
Export

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.
The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.
Answers
A.
The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.
B.
You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.
Answers
B.
You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.
C.
The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1
Answers
C.
The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1
D.
Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.
Answers
D.
Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.
Suggested answer: C, D

Explanation:

The suspicious_Endpoints feed is a dynamic address group that is created by Juniper ATP Cloud based on the IoT device discovery and policy enforcement feature. This feature allows the SRX Series device to send IoT traffic to Juniper ATP Cloud for analysis and classification. Juniper ATP Cloud then creates a threat feed that contains the IP addresses of the suspicious IoT devices and sends it back to the SRX Series device. The SRX Series device can then use this feed to create and enforce security policies for the IoT traffic. The suspicious_Endpoints feed is usable by any SRX Series device that is a part of the same realm as SRX-1, because the feed is shared among the devices that belong to the same Juniper ATP Cloud realm. Juniper ATP Cloud automatically creates the suspicious_Endpoints feed after you commit the security policy that references the feed, because the feed is dynamically generated based on the IoT traffic analysis. You do not need to manually create the feed in the Juniper ATP Cloud interface. Reference:

Example- Configure IoT Device Discovery and Policy Enforcement

Juniper Advanced Threat Prevention Cloud Policy Overview

asked 18/09/2024
Jennifer Leon
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first