Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Juniper JN0-232 Dumps Questions Answers

Page: 1 / 5
Total 65 questions

Security, Associate (JNCIA-SEC) Questions and Answers

Question 1

What is the purpose of a feature profile in a UTM configuration?

Options:

A.

It applies a UTM feature to a security policy.

B.

It applies a UTM feature to protocol traffic.

C.

It defines the operation of a specific UTM feature.

D.

It defines an object list.

Buy Now
Question 2

Your company is acquiring a smaller company that uses the same private address range that your company currently uses in its North America division. You have a limited number of public IP addresses to use for the acquisition. You want to allow the new acquisition's users to connect to the existing services in North America.

Which two features would you enable on your SRX Series Firewall to accomplish this task? (Choose two.)

Options:

A.

IDP

B.

NAT

C.

BGP

D.

PAT

Question 3

Which two statements about destination NAT are correct? (Choose two.)

Options:

A.

Destination NAT enables hosts on a private network to access resources on the Internet.

B.

SRX Series Firewalls support interface-based destination NAT.

C.

Destination NAT enables hosts on the Internet to access resources on a private network.

D.

SRX Series Firewalls support pool-based destination NAT.

Question 4

You are asked to reduce security configuration complexity on your external facing firewalls. You notice that a previous administrator included hundreds of private subnet NAT rules covering various RFC1918 addresses. You want to replace all these rules with a single rule covering all RFC1918 addresses.

Which rule would you use in this scenario?

Options:

A.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.168.0.0/16 172.16.0.0/12]

B.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.16.0.0/12 172.168.0.0/16]

C.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 172.168.0.0/16 192.0.2.0/24 203.1.113.0/24]

D.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.168.0.0/16 172.16.0.0/12 192.0.2.0/24]

Question 5

You are troubleshooting traffic traversing the SRX Series Firewall and require detailed information showing how the flow module is handling the traffic.

How would you accomplish this task?

Options:

A.

Review the flow session table.

B.

Review the forwarding table.

C.

Enable flow trace options.

D.

Enable firewall filters.

Question 6

You need to capture control plane traffic on a high-end SRX Series device.

How would you accomplish this task?

Options:

A.

Configure a packet capture under the edit security datapath-debug capture hierarchy.

B.

Apply a firewall filter matching the desired traffic using the sample action.

C.

Start a shell then use the tcpdump tool.

D.

Apply a port mirroring configuration under the edit forwarding options hierarchy.

Question 7

Click the Exhibit button.

Which type of policy is shown in the exhibit?

Options:

A.

global policy

B.

inter-zone policy

C.

intra-zone policy

D.

default policy

Question 8

Click the Exhibit button.

Which two statements are correct about the content filter shown in the exhibit? (Choose two.)

Options:

A.

.exe files will not be allowed to be uploaded over HTTP.

B.

.exe files will not be allowed to be downloaded over HTTP.

C.

There will be a notice added to the SRX log file about the file being blocked.

D.

There will be an e-mail sent to the user about why the SRX is blocking the file.

Question 9

You want to enable NextGen Web Filtering in SRX Series devices.

In this scenario, which two actions will accomplish this task? (Choose two.)

Options:

A.

Generate a CA-signed certificate.

B.

Generate a self-signed certificate.

C.

Configure an SSL initiation profile.

D.

Configure an SSL proxy profile.

Question 10

Which two statements about SRX Series zones are correct? (Choose two.)

Options:

A.

The null zone allows the use of security policies to log dropped control plane traffic.

B.

The functional zone is used to define the management interface on smaller SRX Series Firewalls.

C.

A security zone processes intra-zone traffic without a security policy.

D.

The Junos-host zone allows the use of security policies to control access to the SRX Series Firewall.

Question 11

Which two statements about security zones are correct? (Choose two.)

Options:

A.

You add a network interface to a security zone before it can send or receive traffic.

B.

Security zones control the type of exception traffic accepted by a network interface.

C.

Interfaces in the same security zone can use different routing instances.

D.

A security zone includes interfaces assigned to different routing instances.

Question 12

Which two statements are true about the NextGen Web Filtering (NGWF) feature on an SRX Series device? (Choose two.)

Options:

A.

The NGWF feature consults the Juniper cloud before consulting your local lists.

B.

The NGWF feature requires a license.

C.

The NGWF feature consults your local lists before consulting the Juniper cloud.

D.

The NGWF feature does not require a license.

Question 13

You are troubleshooting first path traffic not passing through an SRX Series Firewall. You have determined that the traffic is ingressing and egressing the correct interfaces using a route lookup.

In this scenario, what is the next step in troubleshooting why the device may be dropping the traffic?

Options:

A.

Verify that the interfaces are in the correct security zones.

B.

Verify the routing protocol being used.

C.

Verify that source NAT is occurring.

D.

Verify that the correct ALG is being used.

Question 14

You are modifying the NAT rule order and you notice that a new NAT rule has been added to the bottom of the list.

In this situation, which command would you use to reorder NAT rules?

Options:

A.

top

B.

run

C.

up

D.

insert

Question 15

Which two criteria would be used for matching in security policies? (Choose two.)

Options:

A.

MAC address

B.

source address

C.

interface name

D.

applications

Question 16

You want to use Avira Antivirus.

Which two actions should you perform to satisfy this requirement? (Choose two.)

Options:

A.

Restart the management daemon (mgd) to load the components.

B.

Enable the Avira engine in operational mode.

C.

Reboot the SRX Series device to load the components.

D.

Enable the Avira engine in configuration mode.

Question 17

Which statement is correct about source NAT?

Options:

A.

It translates MAC addresses to private IP addresses.

B.

It translates private IP addresses to public IP addresses.

C.

It performs bidirectional IP address translation.

D.

It performs translation on ingress traffic only.

Question 18

Which statement is correct about exception traffic?

Options:

A.

Exception traffic is only handled on the Packet Forwarding Engine.

B.

Exception traffic is rate-limited on the connection between the Packet Forwarding Engine and the Routing Engine.

C.

Exception traffic is anything that is rejected by security policies and requires additional processing.

D.

Exception traffic refers to malformed IP packets received on the Packet Forwarding Engine.

Question 19

What is the purpose of assigning logical interfaces to separate security zones in Junos OS?

Options:

A.

to simplify the configuration of network interfaces

B.

to manage routing protocols and updates

C.

to control traffic that traverses different VLANs using security policies

D.

to enable network monitoring through SNMP

Page: 1 / 5
Total 65 questions