What are the valid actions for a source NAT rule in J-Web? (choose three.)
Correct Answer:
BCE
Explanation
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/nat-security-source-and-source-pool.html
What must you do first to use the Monitor/Alarms/Policy Log workspace in J-Web?
Correct Answer:
D
Which method do VPNs use to prevent outside parties from viewing packet in clear text?
Correct Answer:
C
Which two statements are correct about functional zones? (Choose two.)
Correct Answer:
BD
Which two statements are correct about using global-based policies over zone-based policies? (Choose two.)
Correct Answer:
AB