Which two steps should be included in your security design process? (Choose two.)
You are working with a customer to create a design proposal using SRX Series devices. As part of the design, you must consider the requirements shown below:✑ You must ensure that every packet entering your device is independently inspected against a set of rules.✑ You must provide a way to protect the device from undesired access attempts.✑ You must ensure that you can apply a different set of rules for traffic leaving the device than are in use for traffic entering the device.In this scenario, what do you recommend using to accomplish these requirements?
Which statement is correct about service chaining?
You are designing a data center security solution for a customer. The customer asks that you provide a DDoS solution. Several IPsec tunnels will be terminated at the data center gateway.Which type of security is your customer asking you to implement?
You have a site that has two Internet connections but no switch on the outside of the firewall. You want to use ISP-A over ISP-B during normal operations.Which type of chassis cluster design would you propose to satisfy this requirement?
You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows.Which two design components will accomplish this task? (Choose two.)