Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)
A. Files are flagged for next-day analysis for certain malware types.
B. Rapid cache lookups are used to quickly identify known files.
C. Machine-learning algorithms are enabled to adapt to and identify new malware.
D. It uses a single, best-in-class antivirus engine.
E. Dynamic analysis involves unique deception techniques.
正解:B,C,E
質問 2:
What are two reasons to add Routing Engine protection? (Choose two.)
A. to conceal routes by hiding them behind Internet gateways
B. to ensure that only permitted network nodes and hosts communicate with the WAN infrastructure
C. to ensure that all routing information is encrypted
D. to protect the infrastructure from DDoS attacks
正解:B,D
質問 3:
Your company's IT policy restricts general access to recruitment websites from within the corporate
network However, the human resources department requires access to these sites.
Which two features accomplish this goal? (Choose two)
A. Web authentication enhanced
B. Web filtering
C. URL whitelist
D. Active Directory authentication
正解:B,C
質問 4:
You ate designing the security improvements needed to protect an Application that your company is about
to deploy The only traffic that the application can receive is valid HTTP traffic on TCP port 8080 that was
inspected for Application Layer attacks.
Which three SRX Series device features will satisfy the requirements'? (Choose three)
A. AppSecure
B. screens
C. antivirus
D. security policy
E. intrusion prevention system
正解:A,D,E
質問 5:
What are the three activities in the reconnaissance phase of an attack"? (Choose three)
A. Map the network
B. Propagate the virus to servers and workstations
C. Install malware.
D. Determine the device OS
E. Scan for devices and ports to exploit
正解:A,D,E
質問 6:
An auditor reviewed your company's firewall configurations and is requiring that IPsec VPN connections
must not expose IKE identities during IKE negotiations Which two methods satisfy this requirement?
(Choose two)
A. Use aggressive mode for the IKE policy.
B. Configure GRE over IPsec.
C. Use IKEv2 instead of IKEvI.
D. Use main mode for the IKE policy.
正解:D