Which two components are part of a security zone? (Choose two.)
Correct Answer:BD
Screens on an SRX Series device protect against which two types of threats? (Choose two.)
Correct Answer:AB
ICMP flood
Use the ICMP flood IDS option to protect against ICMP flood attacks. An ICMP flood attack typically occurs when ICMP echo requests use all resources in responding, such that valid network traffic can no longer be processed.
The threshold value defines the number of ICMP packets per second (pps) allowed to be send to the same destination address before the device rejects further ICMP packets.
IP spoofing
Use the IP address spoofing IDS option to prevent spoofing attacks. IP spoofing occurs when an invalid source address is inserted in the packet header to make the packet appear to come from a trusted source.
https://www.juniper.net/documentation/us/en/software/junos/denial-of-service/topics/topic-map/security-introdu
What are two features of the Juniper ATP Cloud service? (Choose two.)
Correct Answer:AB
Which security policy type will be evaluated first?
Correct Answer:D
When transit traffic matches a security policy, which three actions are available? (Choose three.)
Correct Answer:CDE