You are concerned about malicious attachments being transferred to your e-mail server at work through encrypted channels. You want to block these malicious files using your SRX Series device.Which two features should you use in this scenario? (Choose two.)
Click the Exhibit button.Which type of security solution is shown in this exhibit?
You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs.Which two statements are correct in this scenario? (Choose two.)
You are creating a data center security design. Virtual security functions must be performed on east-west traffic. Security functions must be commissioned and decommissioned frequently, and the least resource-intensive architecture must be used.In this scenario, what will accomplish this task?
What are two reasons for using cSRX over vSRX? (Choose two.)
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.In this scenario, what is the minimum number of logging and reporting devices that should be used?