You are asked to block malicious applications regardless of the port number being used. In this scenario, which two application security features should be used? (Choose two.)
Click the Exhibit button. You examine the log file shown in the exhibit after running the set security idp active-policy command. Which two statements are true in this scenario? (Choose two.)
You want to control when cluster failovers occur. In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold. Which feed will the clients IP address be automatically added to in this situation?