Juniper Related Exams
JN0-335 Exam
When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?
Your JIMS server is unable to view event logs.
Which two actions would you take to solve this issue? (Choose two.)
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?