You are concerned about users downloading malicious attachments at work while using encrypted Web mail. You want to block these malicious files using your SRX Series device.
In this scenario, which two features should you use? (Choose two.)
A. SSL reverse proxy
B. SSL forward proxy
C. Sky ATP SMTP scanning
D. Sky ATP HTTP scanning
Which solution centralizes the management of security devices in your data center?
A. Juniper Networks Secure Analytics
B. J-Web
C. Junos Space Security Director
D. Junos CLI
You have multiple SRX chassis clusters on a single broadcast domain. Why must you assign different cluster IDs in this scenario?
A. to avoid MAC address conflicts
B. to avoid control link conflicts
C. to avoid node numbering conflicts
D. to avoid redundancy group conflicts
You are concerned about malicious attachments being transferred to your e-mail server at work through encrypted channels. You want to block these malicious files using your SRX Series device.
Which two features should you use in this scenario? (Choose two.)
A. Sky ATP SMTP scanning
B. Sky ATP HTTP scanning
C. SSL forward proxy
D. SSL reverse proxy
You are creating a security design proposal for an enterprise customer. As part of the design, you are implementing 802.1x authentication on your EX Series devices.
In this scenario, which two statements are correct? (Choose two.)
A. The supplicant is the device that prevents the authenticator's access until it is authenticated
B. The supplicant is the device that is being authenticated
C. The authenticator is the device that is being authenticated
D. The authenticator is the device that prevents the supplicant's access until it is authenticated
You have a campus location with multiple WAN links. You want to specify the primary link used for your VoIP traffic.
In this scenario, which type of WAN load balancing would you use?
A. BGP
B. OSPF
C. FBF
D. ECMP
You will be managing 1000 SRX Series devices. Each SRX Series device requires basic source NAT to access the Internet.
Which product should you use to manage these NAT rules on the SRX Series devices?
A. Security Director
B. CSO
C. Contrail
D. JSA
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points.
Which component supports the SRX Series devices in this scenario?
A. Security Director
B. RADIUS server
C. certificate server
D. DHCP server
You are implementing Routing Engine protection, and packets are processed in a specific order. In this scenario, which function processed a received packet last?
A. loopback interface input policer
B. loopback interface input firewall filter
C. physical interface input firewall filters
D. physical interface input policer
You are concerned about users attacking the publicly accessible servers in your data center through encrypted channels. You want to block these attacks using your SRX Series devices.
In this scenario, which two features should you use? (Choose two.)
A. Sky ATP
B. IPS
C. SSL forward proxy
D. SSL reverse proxy