Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time protection from DDoS attacks. It can be used to detect and block malicious traffic, and also provides granular control over user access and policy enforcement. The MX and vMX devices are well-suited for use with Policy Enforcer due to their high-performance hardware and advanced security features.
You need to deploy an SRX Series device in your virtual environment.
In this scenario, what are two benefits of using a CSRX? (Choose two.)
Two benefits of using a cSRX in your virtual environment are:
The cSRX supports firewall, NAT, IPS, and UTM services: The cSRX is a containerized version of the SRX Series firewall that runs as a Docker container on Linux hosts. It provides the same features and functionality as the SRX Series physical firewalls, such as firewall, NAT, IPS, and UTM services. The cSRX can protect your virtual workloads and applications from various threats and attacks.
The cSRX has low memory requirements: The cSRX is designed to be lightweight and efficient, with low memory and CPU requirements. The cSRX can run on as little as 1 GB of RAM and 1 vCPU, making it suitable for resource-constrained environments.
Click the Exhibit button.
You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.
What needs to be added to this configuration to complete this task?
To create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device, you need to add a security intelligence policy to the permit portion of the security policy. A security intelligence policy is a policy that allows you to block or monitor traffic from malicious sources based on threat intelligence feeds from Juniper ATP Cloud or other providers. One of the feeds that you can use is the Infected-Hosts feed, which contains IP addresses of hosts that are infected with malware and communicate with command-and-control servers. You can create a profile and a rule for the Infected-Hosts feed and specify the threat level and the action to take for the infected hosts. Then, you can link the security intelligence policy with the firewall policy and apply it to the traffic that you want to protect.
You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair.
Which step is necessary to accomplish this task?
In order to manually failover the primary Routing Engine in an SRX Series high availability cluster pair, you must issue the command 'set chassis cluster disable reboot' on the primary node. This command will disable the cluster and then reboot the primary node, causing the secondary node to take over as the primary node. This is discussed in greater detail in the Juniper Security, Specialist (JNCIS-SEC) Study Guide (page 68).
Shawnna
16 days agoFrancesco
17 days agoCordelia
1 months agoCharlette
1 months agoChanel
2 months agoTiera
2 months agoMelodie
2 months agoLorean
3 months agoMicah
3 months agoAide
3 months agoDierdre
3 months agoRocco
3 months agoElenor
4 months agoClemencia
4 months agoCarlota
4 months agoNikita
4 months agoMelita
4 months agoLenora
5 months agoAnglea
5 months agoColette
5 months agoHarrison
5 months agoHaley
6 months agoChrista
6 months agoVirgie
6 months agoBulah
6 months agoTracie
6 months agoKimberely
7 months agoAlva
7 months agoCatherin
7 months agoHoa
7 months agoFiliberto
7 months agoMarylyn
8 months agoStevie
8 months agoIzetta
9 months agoChrista
9 months agoSabina
9 months agoAlaine
10 months agoGraham
10 months agoTeri
10 months agoKanisha
10 months agoCecily
11 months agoKatie
11 months ago