You are asked to include anti-malware features into an existing network design. Traffic from the infected machines must be moved to a quarantined VLAN.
Which product will provide this segregation?
A. screens
B. Sky ATP
C. unified threat management
D. Software Defined Secure Network
You are designing a new campus Internet access service that implements dynamic NAT for customer IP addressing. The customer requires services that allow peer-to-peer networking and online gaming.
In this scenario, what will accomplish this task?
A. EVPN over IPsec
B. one-to-one NAT
C. stacked VLAN tagging
D. endpoint independent mapping
Which statement is correct about service chaining?
A. Service chaining uses IPsec to connect together two or more VMs
B. Service chaining evaluates traffic by using multiple security features on the same instance
C. Service chaining redirects traffic back through the same device for additional processing
D. Service chaining combines multiple VNF instances together in the data flow
You want to deploy JATP in your network that uses SRX Series devices.
In this scenario, which feature must you enable on the SRX Series devices?
A. SSL forward proxy
B. AppSecure
C. UTM antivirus
D. IPS
You are creating a security design proposal for an enterprise customer. As part of the design, you are implementing 802.1x authentication on your EX Series devices.
In this scenario, which two statements are correct? (Choose two.)
A. The supplicant is the device that prevents the authenticator's access until it is authenticated
B. The supplicant is the device that is being authenticated
C. The authenticator is the device that is being authenticated
D. The authenticator is the device that prevents the supplicant's access until it is authenticated
What are two benefits of the vSRX in a virtualized private or public cloud multitenant environment? (Choose two.)
A. full logical systems capabilities
B. stateful firewall protection at the tenant edge
C. 100GbE interface support
D. OSPFv3 capabilities
You are creating a data center security design. Virtual security functions must be performed on east-west traffic. Security functions must be commissioned and decommissioned frequently, and the least resource-intensive architecture must be used.
In this scenario, what will accomplish this task?
A. all-in-one NFV security devices with device templates
B. service chaining with container-based security functions
C. a security appliance segmented into logical systems
D. filter-based forwarding to direct traffic to the required security devices
In a data center, what are two characteristics of access tier VLAN termination on the aggregation tier? (Choose two.)
A. Multiple VLANs can be part of one security zone
B. A security zone is limited to a single VLAN
C. Inter-VLAN traffic within a zone can bypass firewall services
D. Inter-VLAN traffic is secured through firewall services
You are designing a network management solution that provides automation for Junos devices. Your customer wants to know which solutions would require additional software to be deployed to existing Junos devices.
Which two solutions satisfy this scenario? (Choose two.)
A. SaltStack
B. Ansible
C. Puppet
D. Chef
You are creating a security design proposal for a customer who is connecting their headquarters to a remote branch site over an unsecured Internet connection. As part of your design, you must recommend a solution to connect these sites together and ensure that the communication is secured and encrypted.
In this scenario, which solution do you recommend?
A. GRE
B. XMPP
C. IPsec
D. MPLS