Regarding static attack object groups, which two statements are true? (Choose two.)
Answer(s): B,C
static attack object groups are predefined groups of attack objects that are included in Juniper's IPS signature database. These groups do not change automatically when Juniper updates the database.
You are deploying a new SRX Series device and you need to log denied traffic. In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)
you need to create a global firewall rulebase that matches RT_FLOW_SESSION_DENY events. To do this, you need to specify two policy parameters: deny and session-close.
You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?
Answer(s): D
JIMS server is a Juniper Identity Management Service that collects user identity information from different authentication sources for SRX Series devices. It can connect to SRX Series devices and CSO platform in your network.JIMS server is a service that protects corporate resources by authenticating and restricting user access based on roles. It connects to SRX Series devices and CSO platform to provide identity information for firewall policies. To reduce the load that JIMS server places on your network, you should connect JIMS to another SRX Series device. This way, you can distribute the identity information among multiple SRX Series devices and reduce network traffic.
Which two statements about unified security policies are correct? (Choose two.)
Answer(s): C,D
unified security policies are security policies that enable you to use dynamic applications as match conditions along with existing 5-tuple or 6-tuple matching conditions. They simplify application- based security policy management at Layer 7 and provide greater control and extensibility to manage dynamic applications traffic3
Post your Comments and Discuss Juniper JN0-335 exam with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the JN0-335 content, but please register or login to continue.