ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 101 - JN0-636 discussion

Report
Export

you must find an infected host and where the a ack came from using the Juniper ATP Cloud. Which two monitor workspaces will return the requested information? (Choose Two)

A.
Hosts
Answers
A.
Hosts
B.
File Scanning
Answers
B.
File Scanning
C.
Threat Sources
Answers
C.
Threat Sources
D.
Encrypted Traffic
Answers
D.
Encrypted Traffic
Suggested answer: A, C

Explanation:

To find an infected host and where the attack came from using the Juniper ATP Cloud, you need to use the Hosts and Threat Sources monitor workspaces. The other options are incorrect because:

B) The File Scanning monitor workspace shows the files that have been scanned by the Juniper ATP Cloud and their verdicts (clean, malicious, or unknown). It does not show the infected hosts or the attack sources1.

D) The Encrypted Traffic monitor workspace shows the encrypted traffic that has been decrypted by the Juniper ATP Cloud and the certificates that have been used. It does not show the infected hosts or the attack sources2.

Therefore, the correct answer is A and C. You need to use the Hosts and Threat Sources monitor workspaces to find an infected host and where the attack came from using the Juniper ATP Cloud. To do so, you need to perform the following steps:

For Hosts, you need to access the Hosts monitor workspace in the Juniper ATP Cloud WebUI by selecting Monitor > Hosts. You can see the list of hosts that have been detected by the Juniper ATP Cloud and their risk scores, infection levels, and threat categories. You can filter the hosts by various criteria, such as IP address, hostname, domain, or threat category. You can also drill down into each host to see the details of the files, applications, and incidents associated with the host. You can identify the infected host by looking for the host with the highest risk score, infection level, or threat category3.

For Threat Sources, you need to access the Threat Sources monitor workspace in the Juniper ATP Cloud WebUI by selecting Monitor > Threat Sources. You can see the list of threat sources that have been detected by the Juniper ATP Cloud and their risk scores, threat categories, and geolocations.

You can filter the threat sources by various criteria, such as IP address, domain, or threat category. You can also drill down into each threat source to see the details of the files, applications, and incidents associated with the threat source. You can identify the attack source by looking for the threat source with the highest risk score, threat category, or geolocation that matches the infected host.

Reference:

File Scanning

Encrypted Traffic

Hosts

[Threat Sources]

asked 18/09/2024
Kiswendsida ZONGO
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first