You are monitoring an SRX Series device that has the factory-default configuration applied.
In this scenario, where are log messages sent by default?
You have configured a UTM feature profile.
Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)
When are Unified Threat Management services performed in a packet flow?
What are two valid address books? (Choose two.)