Exam JN0-335 All QuestionsBrowse all questions from this exam
Question 13

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

    Correct Answer: A, C

    Juniper Secure Analytics (JSA) utilizes 'building blocks' and 'events' to configure alerts based on certain criteria. Building blocks are essential components that provide a modular and reusable foundation for constructing more complex rules and criteria. They help streamline the creation of security policies and alerts by encapsulating specific attributes, conditions, or logic. Events are collected and analyzed from various sources such as logs and network traffic, enabling the configuration of rules and alerts based on specific occurrences or patterns detected in the data.

Discussion
66dc178Options: AC

"building blocks" are predefined or customizable elements that can be used to construct more complex rules or criteria for monitoring and alerting within a system. They act as foundational components, encapsulating specific attributes, conditions, or logic, which can then be reused across various configurations to streamline the setup and maintenance of security policies or analytics. This modular approach enhances flexibility and efficiency in defining security rules and alerts

gondaliyaOptions: AC

A,C correct

pollzololOptions: BC

B e C correct.

kollieOptions: BC

The two features that are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria are: B. assets C. events Explanation: Assets (Option B): In JSA, assets refer to the entities within your network, such as hosts, routers, or switches. You can configure rules and alerts based on activities related to specific assets. For example, you might want to receive an alert when there is suspicious activity associated with a particular server or network device. Events (Option C): JSA collects and analyzes events from various sources, including logs and network traffic. You can configure rules and alerts based on specific events or patterns in the data. For instance, you might set up an alert for multiple failed login attempts or an unusual spike in network traffic. Building blocks