Juniper Related Exams
JN0-335 Exam
Which method does the loT Security feature use to identify traffic sourced from IoT devices?
Exhibit

Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)
How does the SSL proxy detect if encryption is being used?