You are deploying a new SRX Series device and you need to log denied traffic.In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)
Which two types of SSL proxy are available on SRX Series devices? (Choose two.)
What are two benefits of using a vSRX in a software-defined network? (Choose two.)
You are asked to block malicious applications regardless of the port number being used. In this scenario, which two application security features should be used? (Choose two.)
Which two statements are true about mixing traditional and unified security policies? (Choose two.)
Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)
Which solution enables you to create security policies that include user and group information?
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.Which feed will the clients IP address be automatically added to in this situation?
You want to deploy a virtualized SRX in your environment.In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)
Which two statements about SRX chassis clustering are correct? (Choose two.)