You are using SRX Series devices to secure your network and you require sandboxing for malicious file detonation. However, per company policy, you cannot send potentially malicious files outside your network for sandboxing.Which feature should you use in this situation?
You are creating a security design proposal for an enterprise customer. As part of the design, you are implementing 802.1x authentication on your EX Series devices.In this scenario, which two statements are correct? (Choose two.)
You are asked to install a mechanism to protect an ISP network from denial-of-service attacks from a small number of sources.Which mechanism will satisfy this requirement?
You are responding to an RFP for securing a large enterprise. The RFP requires an onsite security solution which can use logs from third-party sources to prevent threats. The solution should also have the capability to detect and stop zero-day attacks.Which Juniper Networks solution satisfies this requirement?
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points.Which component supports the SRX Series devices in this scenario?
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.In this scenario, what is the minimum number of logging and reporting devices that should be used?