What are two valid JIMS event log sources? (Choose two.)
Which security log message format reduces the consumption of CPU and storage?
You want to deploy vSRX in Amazon Web Services (AWS) virtual private clouds (VPCs).
Which two statements are true in this scenario? (Choose two.)
You are configuring a client-protection SSL proxy profile.
Which statement is correct in this scenario?
What is the default timeout period for a TCP session in the session table of a Junos security device?
Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)
Which two statements are true about virtualized SRX Series devices? (Choose two.)
Which default protocol and port are used for JIMS to SRX client communication?
What is the default session timeout value for ICMP and UDP traffic?
You are deploying a vSRX into a vSphere environment which applies the configuration from a bootable ISO file containing the juniper.conf file. After the vSRX boots and has the configuration applied, you make additional device specific configuration changes, commit, and reboot the device. Once the device finishes rebooting, you notice the specific changes you made are missing but the original configuration is applied.
In this scenario, what is the problem?
Which two statements describe application-layer gateways (ALGs)? (Choose two.)
Which two settings must be enabled on the hypervisor in a vSRX deployment to ensure proper chassis cluster operation? (Choose two.)