Q1. Click the Exhibit button.-- Exhibit --[edit forwarding-options] user@srx240# show packet-capture {file filename my-packet-capture; maximum-capture-size 1500;}-- Exhibit --Referring to the exhibit, you are attempting to perform a packet capture on an SRX240 to troubleshoot an SSH issue in your network. However, no information appears in the packet capture file.Which firewall filter must you apply to the necessary interface to collect…
Q1. Your SRX device is performing NAT to provide an internal resource with a public address. Your DNS server is on the same network segment as the server. You want your internal hosts to be able to reach the internal resource using the DNS name of the resource.How do you accomplish this goal?A. Implement proxy ARP.B. Implement NAT-Traversal.C. Implement NAT…
Q1. In the IPS packet processing flow on an SRX Series device, when does application identification occur?A. before fragmentation processingB. after protocol decodingC. before SSL decryptionD. after attack signature matchingView AnswerAnswer: AQ2. Your company's network has seen an increase in Facebook-related traffic. You have been asked to restrict the amount of Facebook-related traffic to less than 100 Mbps regardless of…
Q1. You are asked to troubleshoot ongoing problems with IPsec tunnels and security policy processing. Your network consists of SRX240s and SRX5600s.Regarding this scenario, which two statements are true? (Choose two.)A. You must enable data plane logging on the SRX240 devices to generate security policy logs.B. You must enable data plane logging on the SRX5600 devices to generate security policy…
Q1. Click the Exhibit button.-- Exhibit–-- Exhibit --In the network shown in the exhibit, you want to forward traffic from the employees to ISP1 and ISP2. You want to forward all Web traffic to ISP1 and all other traffic to ISP2. However, your configuration is not producing the expected results. Part of the configuration is shown in the exhibit. When…
Q1. You want to implement an IPsec VPN on an SRX device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled automatically from the certificate authority.Regarding this scenario, which statement is correct?A. You can use SCEP to accomplish this behavior.B. You can use OCSP…
Q1. Click the Exhibit button.[edit]useu@host# run show log debugFeb3 22:04:32 22:04:31.983991:CID-0:RT:ge-0/0/1.0:5.0.0.25/59028->25.0.0.25/23, tcp, flag 18Feb3 22:04:32 22:04:31.983997:CID-0:RT: find flow: table 0x582738c0, hash 53561(0xffff), sa 5.0.0.25, da 5.0.0.25, sp 59028, dp 23, proto 6, tok 20489Feb3 22:04:32 22:04:31.984004:CID-0:RT:Found: session id 0x14f98. sess tok 20489Feb3 22:04:32 22:04:31.984005:CID-0:RT: flow got session. Feb3 22:04:32 22:04:31.984006:CID-0:RT: flow session id 85912Feb3 22:04:32 22:04:31.984009:CID-0:RT: vector bits 0x2 vector…