Machine-learning algorithms are enabled to adapt to and identify new malware.
Rapid cache lookups are used to quickly identify known files.
Files are flagged for next-day analysis for certain malware types.
It uses a single, best-in-class antivirus engine.
Correct answer: ABC
Explanation:
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:Rapid cache lookups to identify known files. Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying. Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location.
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)