Question 11

You want to collect events and flows from third-party vendors.
Which solution should you deploy to accomplish this task?
  • Question 12

    You are configuring logging for a security policy.
    In this scenario, in which two situations would log entries be generated? (Choose two.)
  • Question 13

    What are three valid actions for a then statement in a security policy? (Choose three.)
  • Question 14

    After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the primary state and node0 is in the backup state. Your network standards dictate that node0 should be in the primary state.
    In this scenario, which command should be used to comply with the network standards?
  • Question 15

    Which two statements about JIMS high availability are true? (Choose two.)