Which two features are used to stop IP spoofing in and out of your network? (Choose two.)
What are two benefits of the vSRX in a virtualized private or public cloud multitenant environment? (Choose two.)
You are designing a new network for your organization with the characteristics shown below.✑ All traffic must pass inspection by a security device.✑ A center-positioned segmentation gateway must provide deep inspection of each packet using 10 Gbps interfaces.✑ Policy enforcement must be centrally managed.Which security model should you choose for your network design?
A hosting company is migrating to cloud-based solutions. Their customers share a physical firewall cluster, subdivided into individual logical firewalls for each customer. Projection data shows that the cloud service will soon deplete all the resources within the physical firewall. As a consultant, you must propose a scalable solution that continues to protect all the cloud customers while still securing the existing physical network.In this scenario, which solution would you propose?
You are working on a network design that will use EX Series devices as Layer 2 access switches in a campus environment. You must include Junos Space in your design. You want to take advantage of security features supported on the devices.Which two security features would satisfy this requirement? (Choose two.)
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.In this scenario, what is the minimum number of logging and reporting devices that should be used?