Which statement is true about Layer 2 zones when implementing transparent mode security?
What are two AppSecure modules? (Choose two.)
You are working as a security administrator and must configure a solution to protect against distributed botnet attacks on your company's central SRX cluster.How would you accomplish this goal?
You are asked to change the configuration of your company's SRX device so that you can block nested traffic from certain Web sites, but the main pages of theseWeb sites must remain available to users. Which two methods will accomplish this goal? (Choose two.)
You are using the AppDoS feature to control against malicious bot client attacks. The bot clients are using file downloads to attack your server farm. You have configured a context value rate of 10,000 hits in 60 seconds. At which threshold will the bot clients no longer be classified as malicious?
What are two network scanning methods? (Choose two.)