Question 31
Which two protocols are supported natively existing Kubernetes-orchestrated unos automation stack? (Choose two.)
Question 32
You are asked to design a security solution for your client's new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely.
Where should the firewall be deployed in this data center?
Where should the firewall be deployed in this data center?
Question 33
A hosting company is migrating to cloud-based solutions. Their customers share a physical firewall cluster, subdivided into individual logical firewalls for each customer. Projection data shows that the cloud service will soon deplete all the resources within the physical firewall. As a consultant, you must propose a scalable solution that continues to protect all the cloud customers while still securing the existing physical network.
In this scenario, which solution would you propose?
In this scenario, which solution would you propose?
Question 34
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points. The design must be able to change the VLAN mapping of the switch port of a user that is already authenticated to the network in the event that the end user device becomes compromised.
Which component satisfies this requirement?
Which component satisfies this requirement?
Question 35
You are implementing Routing Engine protection, and packets are processed in a specific order.
In this scenario, which function processed a received packet last?
In this scenario, which function processed a received packet last?