Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)
A) When a rule is triggered, JSA can respond by sending an e-mail to JSA administrators.
B) Rules are defined on Junos Space Security Director, and then pushed to JSA log collectors.
C) A rule defines matching criteria and actions that should be taken when an events matches the rule.
D) When a rule is triggered, JSA can respond by blocking all traffic from a specific source address.
Correct Answer:
Verified
Q45: The AppQoE module of AppSecure provides which
Q46: What is the default timeout period for
Q47: What information does JIMS collect from domain
Q48: Click the Exhibit button. Q49: Which security log message format reduces the Q51: What are two valid JIMS event log Q52: Which two statements describe application-layer gateways (ALGs)? Q53: You must ensure that all encrypted traffic Q54: Which solution should you use if you Q55: You must configure JSA to accept events
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents