Question 16
Which two steps should be included in your security design process? (Choose two )
Question 17
You are designing a security solution that includes SRX Series firewalls in a chassis cluster.
In this scenario. which two dements must be part of the design? (Choose two.)
In this scenario. which two dements must be part of the design? (Choose two.)
Question 18
You are designing a central management solution Your customer wants a togging solution that will support the collection of up to 10.000 events per second from many SRX Series devices that will be deployed m their network. In this scenario. which solution should you include in your design proposal?
Question 19
When using Contra! networking, security policies are distributed as access control list to which component?
Question 20
You arc asked to proud a design proposal to secure a service provider's network against IP spoofing As part of your design, you must ensure that only traffic sourced from the same subnet is followed on the customer-facing interfaces. Which solution will satisfy this requirement?