You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.In this scenario, what is the minimum number of log receiver devices that you should use?
You are asked to design a secure enterprise WAN where all payload data is encrypted and branch sites communicate directly without routing all traffic through a central hub.Which two technologies would accomplish this task? (Choose two.)
You are asked to provide a design proposal for a campus network. As part of the design, the customer requires that all end user devices must be authenticated before being granted access to their Layer 2 network.Which feature meets this requirement?
You are asked to deploy a security solution in your data center that ensures all traffic flows through the SRX Series devices.Which firewall deployment method meets this requirement?
You want to deploy JATP in your network that uses SRX Series devices.In this scenario, which feature must you enable on the SRX Series devices?
You are asked to design a security solution for your client's new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely.Where should the firewall be deployed in this data center?