You are asked to design an automated vulnerability scanner that can actively check to see which ports are open and report on the findings. Which Junker Networks product would you use in this scenario7
Correct Answer:
C
As part of your service provider WAN network design, you are asked to create a design that secures BGP communication .
In this scenario, what are two reasons you would choose BGP Generated TTL Security Mechanism (GTSM)? (Choose two.)
Correct Answer:
BD
As part of a high availably design for interfaces on an SRX chassis cluster, you are asked to deliver a design that provides both link redundancy and node redundancy What would you use to satisfy the requirement?
Correct Answer:
B
You are asked to deploy a product that will provide east-west protection between virtual machines hosted on the same physical server with a requirement to participate with local routing instances. Which product would you use in this scenario?
Correct Answer:
D
In yew network design, you must include a method to block IP addresses from certain countries that will automatically update within the SRX Series devices' security policies.
Which technology would accomplish this goal?
Correct Answer:
C