What are two logical properties of an interface? (Choose two.)
Correct Answer:BC
https://www.juniper.net/documentation/us/en/software/junos/interfaces-security-devices/topics/topic-map/securi
What are three primary match criteria used in a Junos security policy? (Choose three.)
Correct Answer:ABE
Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)
Correct Answer:BD
What is the default timeout value for TCP sessions on an SRX Series device?
Correct Answer:D
By default, TCP has a 30-minute idle timeout, and UDP has a 60-second idle timeout. Additionally, known IP protocols have a 30-minute timeout, whereas unknown ones have a 60-second timeout. Setting the inactivity timeout is very useful, particularly if you are concerned about applications either timing out or remaining idle for too long and filling up the session table. According to the Juniper SRX Series Services Guide, this can be configured using the 'timeout inactive' statement for the security policy.
Which statement is correct about static NAT?
Correct Answer:C
Static NAT (Network Address Translation) is a type of NAT that maps a public IP address to a private IP address. With static NAT, a one-to-one mapping is created between a public IP address and a private IP address. This means that a single public IP address is mapped to a single private IP address, and all incoming traffic to the public IP address is forwarded to the private IP address.
Which statement is correct about Junos security policies?
Correct Answer:A
The correct statement about Junos security policies is that they enforce rules that should be applied to traffic transiting an SRX Series device. Security policies control the flow of traffic between different zones on the SRX Series device, and dictate which traffic is allowed or denied. They can also specify which application and service requests are allowed or blocked. More information about Junos security policies can be found in the Juniper Networks technical documentation here: https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/security-policies-overview.html.