Question 6 of 65

Your customer is purchasing another company. They must establish communication between the two corporate networks, which use an overlapping IPv4 address space. The customer knows they must deploy some of Network Address Translation (NAT).

Which type of NAT should you use?

Answer

Suggested Answer

The suggested answer is D.

Question 7 of 65

Which component of the Juniper NFV solution architecture acts as the VNF manager?

Answer

Suggested Answer

The suggested answer is C.

Reference: https://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000633-en.pdf
Question 8 of 65

In the ever-changing threat landscape, you are seeking to deploy a dynamic anti-malware solution.

What are three characteristics of the Sky Advanced Threat Prevention public cloud infrastructure? (Choose three.)

Answer

Suggested Answer

The suggested answer is A, B, E.

Sky Advanced Threat Preventions identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Question 9 of 65

You need to provide wireless access to the user community without reducing security.

Which action accomplishes this task?

Answer

Suggested Answer

The suggested answer is C.

Question 10 of 65

Where are the security policies enforced for next-generation firewalls?

Answer

Suggested Answer

The suggested answer is D.