Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)
Which statement is correct about static NAT?
Which two security features inspect traffic at Layer 7? (Choose two.)
Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)
Which order is correct for Junos security devices that examine policies for transit traffic?
Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)
When configuring antispam, where do you apply any local lists that are configured?
Click the Exhibit button.
What is the purpose of the host-inbound-traffic configuration shown in the exhibit?
You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.
Which security feature should you implement in this scenario?
Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.
In this scenario, which security feature would you use to satisfy this request?