You recently implemented application firewall rules on an SRX device to act upon encrypted traffic. However, the encrypted traffic is not being correctly identified.Which two actions will help the SRX device correctly identify the encrypted traffic? (Choose two.)
You have just created a few hundred application firewall rules on an SRX device and applied them to the appropriate firewall polices. However, you are concerned that the SRX device might become overwhelmed with the increased processing required to process traffic through the application firewall rules.Which three actions will help reduce the amount of processing required by the application firewall rules? (Choose three.)
Referring to the following output, which command would you enter in the CLI to produce this result?Ruleset Application Client-to-server Rate(bps) Server-to-client Rate(bps) http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200 http-App-QoS HTTP ftp-C2S 200 ftp-C2S 200 ftp-App-QoS FTP ftp-C2S 100 ftp-C2S 100
You are asked to apply individual upload and download bandwidth limits to YouTube traffic. Where in the configuration would you create the necessary bandwidth limits?
You want to verify that all application traffic traversing your SRX device uses standard ports. For example, you need to verify that only DNS traffic runs through port 53, and no other protocols. How would you accomplish this goal?
What are two network scanning methods? (Choose two.)