You want to automatically generate the encryption and authentication keys during IPsec VPN tunnel establishment.What would be used to accomplish this task?
Which two statements about security policy processing on SRX Series devices are true? (Choose two.)
You are asked to run a report to find the top talkers on your network in the past 48 hours.In this scenario, the report will be in which format when the J-Web UI delivers it to you?
Which UTM feature should you use to protect users from visiting certain blacklisted websites?
Which two statements are true about security policies in the factory-default configuration of an SRX340? (Choose two.)
Which two actions are performed on an incoming packet matching an existing session? (Choose two.)