Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)
A) When a rule is triggered, JSA can respond by sending an e-mail to JSA administrators.
B) Rules are defined on Junos Space Security Director, and then pushed to JSA log collectors.
C) A rule defines matching criteria and actions that should be taken when an events matches the rule.
D) When a rule is triggered, JSA can respond by blocking all traffic from a specific source address.
Correct Answer:
Verified
Q45: The AppQoE module of AppSecure provides which
Q46: What is the default timeout period for
Q47: What information does JIMS collect from domain
Q48: Click the Exhibit button. Q49: Which security log message format reduces the Q51: What are two valid JIMS event log Q52: Which two statements describe application-layer gateways (ALGs)? Q53: You must ensure that all encrypted traffic Q54: Which solution should you use if you Q55: You must configure JSA to accept events![]()
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents