Your customer is assessing their network incident response plan. They need to improve their recovery time when a networking issue occurs, especially when involves JTAC support. They have limited internal support staff and little automation experience to develop their own tools.Which Juniper solution meets these requirements?
Your customer is planning to secure a data center with webservers reachable through two ISP connections terminating on each node of an active/passive SRXSeries chassis cluster. ISP-1 is the preferred connection because it provides higher bandwidth than ISP-2.Which two must you include in your design proposal to meet this requirement? (Choose two.)
You are asked to provide user-based network access through an SRX Series device. The implementation must use Active Directory credentials for user account validation.Which two solutions satisfy these requirements? (Choose two.)
What are two design requirements for deploying a chassis cluster across a Layer 2 network? (Choose two.)
Your company is establishing a BYOD policy and you are asked to create the appropriate security infrastructure. In the policy, Internet access should only be provided to the BYOD wired and wireless devices.Which two security features meet these requirements? (Choose two.)
Which security solution protects against zero-day attacks?