Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Juniper Exam JN0-231 Topic 2 Question 22 Discussion

Actual exam question for Juniper's JN0-231 exam
Question #: 22
Topic #: 2
[All JN0-231 Questions]

Which two criteria should a zone-based security policy include? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Juniper ATP Cloud is a cloud-based ATP subscription that delivers advanced threat protection services, such as URL categorization, file reputation analysis, and malware analysis. It is able to quickly and accurately categorize URLs and other web content, and can also provide detailed reporting on web usage, as well as the ability to define and enforce acceptable use policies. Additionally, Juniper ATP Cloud is able to block and allow specific IPs, providing additional protection against malicious content.


Contribute your Thoughts:

Joaquin
12 days ago
I'm with Barrett on this one. A and B would be a security policy fit for a kindergarten classroom, not an enterprise network. C and D are the way to go.
upvoted 0 times
...
Barrett
17 days ago
Ha! Imagine if the correct answers were A and B. That would be like a security policy for a really confused firewall. 'Allow all traffic from any port to any port.' Not very secure, is it?
upvoted 0 times
...
Man
19 days ago
Hmm, I was thinking A and B might be relevant too, since the source and destination ports could be part of the policy criteria. But I guess that's more for a traditional firewall policy.
upvoted 0 times
...
Bettye
21 days ago
I agree with Gerald. C and D are the correct answers. The zone context defines the security boundaries, and the action specifies the desired behavior.
upvoted 0 times
Kerrie
3 days ago
I think C and D are the right choices. Zone context and action are important.
upvoted 0 times
...
...
Gerald
2 months ago
C and D seem like the obvious choices here. Zone context and an action are key components of a zone-based security policy.
upvoted 0 times
Lasandra
10 days ago
I agree, zone context and an action are crucial for setting up the policy.
upvoted 0 times
...
Joaquin
14 days ago
C and D are definitely important for a zone-based security policy.
upvoted 0 times
...
...
Kimberely
2 months ago
I believe both source port and destination port should be included for a comprehensive security policy.
upvoted 0 times
...
Jeanice
2 months ago
I agree with you, Leeann. We also need to consider the action to be taken in the policy.
upvoted 0 times
...
Leeann
2 months ago
I think the zone context is important for a zone-based security policy.
upvoted 0 times
...

Save Cancel