NO.1 As part of your branch office security design, you are asked to include the necessary features to
-stop spam and phishing,
-stop viruses, Trojans, and spyware,
-control website access, and -control content
Which security feature set meets these requirements?
A. services offloading
B. unified threat management
C. intrusion prevention system
D. stateless firewall filters
NO.2 Your customer is planning to secure a data center with web servers reachable through two ISP
connections terminating on each node of an active/passive SRX Series chassis cluster. ISP-1 Is the
preferred connection because it provides higher bandwidth than ISP-2.
Which two must you include in your design proposal to meet this requirement (Choose two)
A. Ensure that both ISP interfaces are in the same zone and use interface monitoring.
B. Ensure that both the ISP interfaces are in different zones and use interface monitoring.
C. Use conditional BGP advertisements and use Interface monitoring for both ISP Interfaces.
D. Use static routing and use interface monitoring for both ISP interfaces.
NO.3 You are asked to implement port-based authentication on your access switches. Security and
access are the two primary requirements. Which authentication solution satisfies these
A. network access control
B. MAC RADIUS
C. firewall authentication
D. IPsec tunnel
NO.4 Click the Exhibit button.
The data center shown in the exhibit is running an active/active SRX Series chassis cluster and an
active/active network infrastructure Customer A needs to communicate with customer D, and
needs to communicate with customer C
In this scenario Which two steps avoid Z-mode traffic? (Choose two)
A. Associate customer B and customer C network segments in different redundancy groups.
B. Associate customer A and customer D network segments in different redundancy groups.
C. Associate customer B and customer C network segments in me same redundancy groups.
D. Associate customer A and customer D network segments in the same redundancy groups