Which statement about NAT is correct?
Correct Answer:
D
Which two statements are correct about IKE security associations? (Choose two.)
Correct Answer:
AD
Which order is correct for Junos security devices that examine policies for transit traffic?
Correct Answer:
A
Which two criteria should a zone-based security policy include? (Choose two.)
Correct Answer:
AB
A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service. A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points.
Each policy consists of:
A unique name for the policy.
A from-zone and a to-zone, for example: user@host# set security policies from-zone untrust to-zone untrust A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications. The user identity firewall provides greater granularity by including an additional tuple, source-identity, as part of the policy statement.
A set of actions to be performed in case of a match—permit, deny, or reject. Accounting and auditing elements—counting, logging, or structured system logging.
https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-c
What are two features of the Juniper ATP Cloud service? (Choose two.)
Correct Answer:
AB