Question 11
You want to collect events and flows from third-party vendors.
Which solution should you deploy to accomplish this task?
Which solution should you deploy to accomplish this task?
Question 12
You are configuring logging for a security policy.
In this scenario, in which two situations would log entries be generated? (Choose two.)
In this scenario, in which two situations would log entries be generated? (Choose two.)
Question 13
What are three valid actions for a then statement in a security policy? (Choose three.)
Question 14
After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the primary state and node0 is in the backup state. Your network standards dictate that node0 should be in the primary state.
In this scenario, which command should be used to comply with the network standards?
In this scenario, which command should be used to comply with the network standards?
Question 15
Which two statements about JIMS high availability are true? (Choose two.)
