Referring to the exhibit.
A default static route on SRX-1 sends all traffic to ISP-A. You have configured APBR to send all requests for streaming video traffic to ISP-B. However, the return traffic from the streaming video server is coming through ISP-A, and the traffic is being dropped by SRX-1. You can only make changes on SRX-1.
How do you solve this problem?
A. Place both ISP-facing interfaces in the same zone.
B. Change the APBR routing instance from a forwarding instance to a virtual router instance.
C. Enable AppTrack to keep track of the sessions and zones for the streaming video traffic.
D. Configure BGP to control the return path of the streaming video traffic.
You want to use a security profile to limit the system resources allocated to user logical systems.
In this scenario, which two statements are true? (Choose two.)
A. If nothing is specified for a resource, a default reserved resource is set for a specific logical system.
B. If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.
C. One security profile can only be applied to one logical system.
D. One security profile can be applied to multiple logical systems.
You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.
Which product provides this capability?
A. Security Director
B. Network Director
C. Mist
D. Security Director Insights
Referring to the exhibit.
You are troubleshooting a new IPsec VPN that is configured between your corporate office and the RemoteSite1 SRX Series device. The VPN is not currently establishing. The RemoteSite1 device is being assigned an IP address on its gateway interface using DHCP.
Which action will solve this problem?
A. On the RemoteSite1 device, change the IKE gateway external interface to st0.0.
B. On both devices, change the IKE version to use version 2 only.
C. On both devices, change the IKE policy proposal set to basic.
D. On both devices, change the IKE policy mode to aggressive.
You are asked to configure tenant systems.
Which two statements are true in this scenario? (Choose two.)
A. A tenant system can have only one administrator.
B. After successful configuration, the changes are merged into the primary database for each tenant system.
C. Tenant systems have their own configuration database.
D. You can commit multiple tenant systems at a time.
Referring to the exhibit.
Which statement is true?
A. SRG1 is configured in hybrid mode.
B. The ICL is encrypted.
C. If SRG1 moves to peer 2, peer 1 will drop packets sent to the SRG1 interfaces.
D. If SRG1 moves to peer 2, peer 1 will forward packets sent to the SRG1 interfaces.
You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.
What are two reasons for this problem? (Choose two.)
A. The session did not properly reclassify midstream to the correct APBR rule.
B. IDP disable is not configured on the APBR rule.
C. The application services bypass is not configured on the APBR rule.
D. The APBR rule does a match on the first packet.
You are configuring an interconnect logical system that is configured as a VPLS switch to allow two logical systems to communicate.
Which two parameters are required when configuring the logical tunnel interfaces? (Choose two.)
A. Encapsulation ethernet must be used.
B. The virtual tunnel interfaces should only be configured with two logical unit pairs per logical system interconnect.
C. The logical tunnel interfaces should be configured with two logical unit pairs per logical system interconnect.
D. Encapsulation ethernet-vpls must be used.
You have deployed automated threat mitigation using Security Director with Policy Enforcer, Juniper ATP Cloud, SRX Series devices, Forescout, and third-party switches. In this scenario, which device is responsible for communicating directly to the third-party switches when infected hosts need to be blocked?
A. Forescout
B. Policy Enforcer
C. Juniper ATP Cloud
D. SRX Series device
You are using trace options to troubleshoot a security policy on your SRX Series device.
Referring to the exhibit, which two statements are true? (Choose two.)
A. The SSH traffic matches an existing session.
B. No entries are created in the SRX session table.
C. The traffic is not destined for the root logical system.
D. The security policy controls traffic destined to the SRX device.