Which security solution protects against zero-day attacks?
Correct Answer:
B
🗳️
Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)
Correct Answer:
ABC
🗳️
Sky Advanced Threat Preventions identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location.
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)
Correct Answer:
ABD
🗳️
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
You are asked to implement a new application to share documents with trusted external organizations while minimizing the risk of an attack that would enable access to other enterprise systems.
In this scenario, which two locations would you recommend to deploy the application? (Choose two.)
Correct Answer:
AD
🗳️