A client wants to deploy a vSRX chassis cluster across two existing ESXi hosts without changing the external switch configuration.Which two actions must you perform to meet this requirement? (Choose two.)
Click the Exhibit button.Referring to the network shown in the exhibit, a SYN flood attacks is initiated by an attacker that has a public IP address from ISP B within the 200.200.10.0/24 prefix. The attacker is sending SYN packets to the victim, connected to ISP A, with destination address of 100.100.31.78 using spoofed source addresses at random from the 192.168.0.0/16 prefix.Which two design best practices would prevent this attack from working? (Choose two.)
You are asked to deploy user access to the Internet, and you want to determine which applications are passing through the firewall.Which feature accomplishes this task?
A customer is globally expanding their retail stores exponentially. Their IT department is small. The effort to deploy new services is delaying the project. The customers requirements are shown below.-New stores must be activated with minimal effort.-New stores must have IPsec connectivity back to the main data center.-Some systems must be deployed locally and cannot be hosted in the data center.-All systems deployed in remote stores must be upgraded at once when needed.-The solution must allow new services to be included in the remote locations with minimal effort.Which three Juniper solutions would you recommend in this scenario? (Choose three.)
You are designing a network management solution for a customers data center. Your design must include a solution that supports the collection of events fromSRX Series devices, as well as events from various third-party devices.In this scenario, which solution should you recommend?
Click the Exhibit button.The data center shown in the exhibit is running an active/active SRX Series chassis cluster and an active/active network infrastructure. Customer A needs to communicate with customer D, and customer B needs to communicate with customer C.In this scenario. Which two steps avoid Z-mode traffic? (Choose two.)