Which two statements are true about the null zone? (Choose two.)
A. All interface belong to the bull zone by default.
B. All traffic to the null zone is dropped.
C. All traffic to the null zone is allowed
D. The null zone is a user-defined zone
Users on the network are restricted from accessing Facebook, however, a recent examination of the logs
show that users are accessing Facebook.
Referring to the exhibit,
Why is this problem happening?
A. Global rules are honored before zone-based rules.
B. The internet-Access rule has a higher precedence value
C. The internet-Access rule is listed first
D. Zone-based rules are honored before global rules
What are two characteristic of static NAT SRX Series devices? (Choose two.)
A. Source and destination NAT rules take precedence over static NAT rules.
B. A reverse mapping rule is automatically created for the source translation.
C. Static NAT rule take precedence over source and destination NAT rules.
D. Static rules cannot coexist with destination NAT rules on the same SRX Series device configuration.
What must you do first to use the Monitor/Events workspace in the j-Web interface?
A. You must enable stream mode security logging on the SRX Series device
B. You must enable event mode security logging on the SRX Series device.
C. You must enable security logging that uses the SD-Syslog format.
D. You must enable security logging that uses the TLS transport mode.
Which two statements are true about UTM on an SRX340? (Choose two.)
A. A default UTM policy is created.
B. No default profile is created.
C. No default UTM policy is created
D. A default UTM profile is created
Firewall filters define which type of security?
A. Stateful
B. Stateless
C. NGFW
D. Dynamic enforcement
You configure and applied several global policies and some of the policies have overlapping match criteria.
A. In this scenario, how are these global policies applies?
B. The first matched policy is the only policy applied.
C. The most restrictive that matches is applied.
D. The least restrictive policy that matches is applied.
Which management software supports metadata-based security policies that are ideal for cloud deployments?
A. Security Director
B. J-Web
C. Network Director
D. Sky Enterprise
Host-inbound-traffic is configured on the DMZ zone and the ge-0/0/9.0 interface attached to that zone. Referring to the exhibit,
which to types of management traffic would be performed on the SRX Series device? (Choose two.)
A. HTTPS
B. SSH
C. Finger
D. HTTP
What does IPsec use to negotiate encryption algorithms?
A. TLS
B. AH
C. ESP
D. IKE