You are required to secure a network against malware. You must ensure that in the event that a
compromised host is identified within the network. In this scenario after a threat has been
identified, which two components are responsible for enforcing MAC-level infected host ?
You are required to secure a network against malware. You must ensure that in the event that a compromised host is identified within the network, the host is isolated from the rest of the network. In this scenario, after a threat has been identified, the two components that are responsible for enforcing MAC-level infected host are:
The other options are incorrect because:
B) Juniper ATP Appliance. Juniper ATP Appliance is a hardware solution that provides advanced threat prevention by detecting and blocking malware, ransomware, and other cyberattacks. Juniper ATP Appliance can analyze the network traffic and identify the compromised hosts based on their behavior and communication patterns. Juniper ATP Appliance can also send threat intelligence feeds to Policy Enforcer and SRX Series devices to enable automated threat remediation across the network. However, Juniper ATP Appliance cannot enforce MAC-level infected host, which is a feature that requires Layer 2 switching capabilities and is supported by EX Series devices.
SRX Series Services Gateways Overview
[Juniper ATP Appliance Overview]
Exhibit:
Referring to the exhibit, the operator user is unable to save configuration files to a usb stick the is
plugged into SRX. What should you do to solve this problem?
To solve the problem of the operator user being unable to save configuration files to a USB stick that is plugged into SRX, you need to add the system-control permission flag to the operations class. The other options are incorrect because:
Enter the configuration mode: user@host> configure
Navigate to the system login class hierarchy: user@host# edit system login class operations
Add the system-control permission flag: user@host# set permissions system-control
Commit the changes: user@host# commit
How to mount a USB drive on EX/SRX/MX/QFX Series platforms to import/export files
you must create a secure fabric in your company's network
In this Scenario, Which three statements are correct? (Choose Three)
To create a secure fabric in your company's network, you need to know the following facts:
Therefore, the correct answer is B, D, and E. The other options are incorrect because:
A)MX Series devices associated with tenants can belong to multiple sites, not only one site1.
C)SRX Series devices can belong to only one site, not multiple sites1.
Exhibit:
The security trace options configuration shown in the exhibit is committed to your SRX series firewall. Which two statements are correct in this Scenario? (Choose Two)
The security trace options configuration shown in the exhibit is committed to your SRX series firewall. The following statements are correct in this scenario:
The other statements are incorrect because:
A) The file debugger will not be readable by all users, but only by the user who committed this configuration, as explained above.
C) The trace will not halt after generating 10 log files, but will continue to overwrite the older ones, as explained above.
Currently there are no comments in this discussion, be the first to comment!