exam questions

Exam JN0-231 All Questions

View all questions & answers for the JN0-231 exam

Exam JN0-231 topic 1 question 7 discussion

Actual exam question from Juniper's JN0-231
Question #: 7
Topic #: 1
[All JN0-231 Questions]

Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)

  • A. FTP
  • B. SMTP
  • C. SNMP
  • D. HTTP
  • E. SSH
Show Suggested Answer Hide Answer
Suggested Answer: ABD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
longanghi
4 months, 1 week ago
Selected Answer: ABD
A B D is correct
upvoted 1 times
...
Adzriciz
5 months ago
Selected Answer: ABD
its ABD
upvoted 1 times
...
66dc178
5 months, 3 weeks ago
Protocols like SNMP (Simple Network Management Protocol) and SSH (Secure Shell) are generally used for network management and secure remote access, respectively, and are not typically the focus of UTM inspection for threats in the same way as FTP, SMTP, and HTTP traffic.
upvoted 1 times
...
juanjoleandro16
7 months, 1 week ago
Selected Answer: ABD
Correct answer: ABD
upvoted 1 times
...
Engg_flint
8 months, 2 weeks ago
its ABD
upvoted 1 times
...
ars92
9 months, 2 weeks ago
Selected Answer: ABD
Unified Threat Management (UTM) solutions typically inspect traffic from a variety of protocols to provide comprehensive security. While the specific protocols may vary based on the UTM solution and its capabilities, here are three common protocols that UTM systems often inspect: HTTP (Hypertext Transfer Protocol): UTM devices commonly inspect web traffic over HTTP to detect and prevent threats such as malicious websites, phishing attempts, and malware downloads. SMTP (Simple Mail Transfer Protocol): Email traffic is a significant vector for cyber threats. UTM solutions often inspect SMTP traffic to identify and block spam, malware attachments, and phishing emails. FTP (File Transfer Protocol): UTM devices may inspect FTP traffic to ensure that file transfers do not involve malicious content. This helps in preventing the spread of malware through file-sharing activities.
upvoted 3 times
...
enkar
10 months, 4 weeks ago
ABD, C is wrong
upvoted 1 times
...
fosi130
11 months, 3 weeks ago
ABD for me
upvoted 1 times
...
libm2
1 year ago
Selected Answer: ABD
It's ABD
upvoted 2 times
...
Dulgoldur
1 year, 1 month ago
Selected Answer: ABD
It's ABD
upvoted 1 times
...
Rbrahmi
1 year, 4 months ago
Selected Answer: ABD
It's ABD
upvoted 1 times
...
Bubu3k
1 year, 8 months ago
Selected Answer: ABD
It's ABD
upvoted 4 times
...
Totalstranger
1 year, 8 months ago
Selected Answer: ABD
https://www.inetzero.com/blog/unified-threat-management-deeper-dive-traffic-inspection/
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago