Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Juniper Exam JN0-231 Topic 2 Question 22 Discussion

Actual exam question for Juniper's JN0-231 exam
Question #: 22
Topic #: 2
[All JN0-231 Questions]

Which two criteria should a zone-based security policy include? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Juniper ATP Cloud is a cloud-based ATP subscription that delivers advanced threat protection services, such as URL categorization, file reputation analysis, and malware analysis. It is able to quickly and accurately categorize URLs and other web content, and can also provide detailed reporting on web usage, as well as the ability to define and enforce acceptable use policies. Additionally, Juniper ATP Cloud is able to block and allow specific IPs, providing additional protection against malicious content.


Contribute your Thoughts:

Joaquin
2 months ago
I'm with Barrett on this one. A and B would be a security policy fit for a kindergarten classroom, not an enterprise network. C and D are the way to go.
upvoted 0 times
...
Barrett
2 months ago
Ha! Imagine if the correct answers were A and B. That would be like a security policy for a really confused firewall. 'Allow all traffic from any port to any port.' Not very secure, is it?
upvoted 0 times
Ranee
13 days ago
D) an action
upvoted 0 times
...
Katina
18 days ago
C) zone context
upvoted 0 times
...
Jaime
20 days ago
B) a destination port
upvoted 0 times
...
Pansy
30 days ago
A) a source port
upvoted 0 times
...
...
Man
2 months ago
Hmm, I was thinking A and B might be relevant too, since the source and destination ports could be part of the policy criteria. But I guess that's more for a traditional firewall policy.
upvoted 0 times
...
Bettye
2 months ago
I agree with Gerald. C and D are the correct answers. The zone context defines the security boundaries, and the action specifies the desired behavior.
upvoted 0 times
Salena
1 months ago
Definitely, C and D are the key criteria for setting up a zone-based security policy.
upvoted 0 times
...
Nu
1 months ago
I agree, the zone context and action are crucial for a zone-based security policy.
upvoted 0 times
...
Kerrie
2 months ago
I think C and D are the right choices. Zone context and action are important.
upvoted 0 times
...
...
Gerald
3 months ago
C and D seem like the obvious choices here. Zone context and an action are key components of a zone-based security policy.
upvoted 0 times
Lasandra
2 months ago
I agree, zone context and an action are crucial for setting up the policy.
upvoted 0 times
...
Joaquin
2 months ago
C and D are definitely important for a zone-based security policy.
upvoted 0 times
...
...
Kimberely
3 months ago
I believe both source port and destination port should be included for a comprehensive security policy.
upvoted 0 times
...
Jeanice
3 months ago
I agree with you, Leeann. We also need to consider the action to be taken in the policy.
upvoted 0 times
...
Leeann
3 months ago
I think the zone context is important for a zone-based security policy.
upvoted 0 times
...

Save Cancel