Which three statements are correct about fabric interfaces on the SRX5800? (Choose three.)
CDE
Reference:
<
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-data-plane-interfaces.html
>
You want to support reth LAG interfaces on a chassis cluster.
What must be enabled on the interconnecting switch to accomplish this task?
B
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-redundant-ethernet-lag-interfaces.html
What are three primary functions of JATP? (Choose three.)
ADE
You must deploy AppSecure in your network to block risky applications.
In this scenario, which two AppSecure features are required? (Choose two.)
BD
Which two statements describe IPS? (Choose two.)
AD
What is the correct step sequence used when Sky ATP analyzes a file?
C
Reference:
https://www.juniper.net/documentation/en_US/release-independent/sky-
atp/information-products/
pathway-pages/sky-atp-admin-guide.pdf page 9
Which two statements about JIMS high availability are true? (Choose two.)
AC
Where is AppSecure executed in the flow process on an SRX Series device?
D
Data plane logging operates in which two modes? (Choose two.)
CD
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/system-logging-for-a-security-device.html
Which statement about the control link in a chassis cluster is correct?
A
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-dual-control-links.html
Which default protocol and port are used for JIMS to SRX client communication?
C
Reference:
https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-
certificate-configuring.html#:~:text=By%20default%2C%20the%20HTTPS%20port%20is%20443.&text=The%20JI
MS% 20server%20communicates%20with,Firewall%20to%20allow%20this%20communication
Click the Exhibit button.
You have deployed Sky ATP to protect your network from attacks so that users are unable to
download malicious files. However, after a user attempts to download a malicious file, they are still
able to communicate through the SRX Series device.
Referring to the exhibit, which statement is correct?
C
Which two statements apply to policy scheduling? (Choose two.)
BC
Reference:
https://www.juniper.net/documentation/en_US/cso5.4.0/topics/concept/cp-about-schedule-overview.html
Click the Exhibit button.
Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values
configured on the SRX client? (Choose two.)
BC
Reference:
https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-srx-configuring.html
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
AC
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-ssl-tls.html