Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Juniper JN0-335 Dumps

Page: 1 / 7
Total 98 questions

Security - Specialist (JNCIS-SEC) Questions and Answers

Question 1

Your JIMS server is unable to view event logs.

Which two actions would you take to solve this issue? (Choose two.)

Options:

A.

Enable the correct host-inbound-traffic rules on the SRX Series devices.

B.

Enable remote event log management within Windows Firewall on the necessary Exchange servers.

C.

Enable remote event log management within Windows Firewall on the necessary domain controllers.

D.

Enable remote event log management within Windows Firewall on the JIMS server.

Question 2

Which two statements about SRX Series device chassis clusters are correct? (Choose two.)

Options:

A.

The chassis cluster data plane is connected with revenue ports.

B.

The chassis cluster can contain a maximum of three devices.

C.

The chassis cluster data plane is connected with SPC ports.

D.

The chassis cluster can contain a maximum of two devices.

Question 3

Which sequence does an SRX Series device use when implementing stateful session security policies using Layer 3 routes?

Options:

A.

An SRX Series device will perform a security policy search before conducting a longest-match Layer 3 route table lookup.

B.

An SRX Series device performs a security policy search before implementing an ALG security check on the longest-match Layer 3 route.

C.

An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search.

D.

An SRX Series device conducts an ALG security check on the longest-match route before performing a security policy search.

Question 4

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.

Download the IPS signature database.

B.

Enroll the SRX Series device with Juniper ATP Cloud.

C.

Install the IPS signature database.

D.

Reboot the SRX Series device.

Question 5

Which two statements are true about the vSRX? (Choose two.)

Options:

A.

It does not have VMXNET3 vNIC support.

B.

It has VMXNET3 vNIC support.

C.

UNIX is the base OS.

D.

Linux is the base OS.

Question 6

Exhibit

Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?

Options:

A.

Forwarding Lookup

B.

Services ALGs

C.

Security Policy

D.

Screens

Question 7

Exhibit

Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)

Options:

A.

forward proxy

B.

client protection proxy

C.

server protection proxy

D.

reverse proxy

Question 8

You want to deploy a virtualized SRX in your environment.

In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)

Options:

A.

The vSRX supports Layer 2 and Layer 3 configurations.

B.

Only the vSRX provides clustering.

C.

The vSRX has faster boot times.

D.

Only the vSRX provides NAT, IPS, and UTM services

Question 9

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

Options:

A.

Juniper ATP Cloud allows the creation of allowlists.

B.

Juniper ATP Cloud uses a single antivirus software package to analyze files.

C.

Juniper ATP Cloud allows end users to bypass the inspection of files.

D.

Juniper ATP Cloud performs a cache lookup on files.

Question 10

Which statement defines the function of an Application Layer Gateway (ALG)?

Options:

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Question 11

You want to control when cluster failovers occur.

In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)

Options:

A.

hearcbeac-interval

B.

heartbeac-address

C.

hearcbeat-cos

D.

hearcbeac-chreshold

Question 12

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

Options:

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Question 13

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.

How do you solve this problem?

Options:

A.

Load a known good, but expired. CA certificate onto the SRX Series device.

B.

Install a new SRX Series device to act as the client proxy

C.

Reboot the SRX Series device.

D.

Import the existing certificate to each client device.

Question 14

How does the SSL proxy detect if encryption is being used?

Options:

A.

It uses application identity services.

B.

It verifies the length of the packet

C.

It queries the client device.

D.

It looks at the destination port number.

Question 15

You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.

Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?

Options:

A.

AppFW

B.

SIP ALG

C.

AppQoE

D.

AppQoS

Question 16

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

Options:

A.

scalability

B.

no required software license

C.

granular security

D.

infinite number of interfaces

Question 17

Which method does the loT Security feature use to identify traffic sourced from IoT devices?

Options:

A.

The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud

B.

The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.

C.

The SRX Series device identifies loT devices using their MAC address.

D.

The SRX Series device identifies loT devices from metadata extracted from their transit traffic.

Question 18

Exhibit

Referring to the exhibit which statement is true?

Options:

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Question 19

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.

Which feed will the clients IP address be automatically added to in this situation?

Options:

A.

the command-and-control cloud feed

B.

the allowlist and blocklist feed

C.

the custom cloud feed

D.

the infected host cloud feed

Question 20

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

Options:

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Question 21

Which two statements are correct about the cSRX? (Choose two.)

Options:

A.

The cSRX supports firewall, NAT, IPS, and UTM services.

B.

The cSRX only supports Layer 2 "bump-in-the-wire" deployments.

C.

The cSRX supports BGP, OSPF. and IS-IS routing services.

D.

The cSRX has three default zones: trust, untrust, and management

Question 22

While working on an SRX firewall, you execute the show security policies policy-name detail command.

Which function does this command accomplish?

Options:

A.

It displays details about the default security policy.

B.

It identifies the different custom policies enabled.

C.

It shows the system log files for the local SRX Series device.

D.

It shows policy counters for a configured policy.

Question 23

You want to set up JSA to collect network traffic flows from network devices on your network.

Which two statements are correct when performing this task? (Choose two.)

Options:

A.

BGP FlowSpec is used to collect traffic flows from Junos OS devices.

B.

Statistical sampling increases processor utilization

C.

Statistical sampling decreases event correlation accuracy.

D.

Superflows reduce traffic licensing requirements.

Question 24

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

Options:

A.

vQFX

B.

MX

C.

vMX

D.

QFX

Question 25

Which statement about security policy schedulers is correct?

Options:

A.

Multiple policies can use the same scheduler.

B.

A policy can have multiple schedulers.

C.

When the scheduler is disabled, the policy will still be available.

D.

A policy without a defined scheduler will not become active

Question 26

Click the Exhibit button.

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Question 27

Exhibit

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

Options:

A.

Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.

B.

Execute the Junos commit full command to override the error and apply the configuration.

C.

Create a custom application named http at the [edit applications] hierarchy.

D.

Modify the security policy to use the built-in Junos-http applications.

Question 28

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Question 29

Which two statements about unified security policies are correct? (Choose two.)

Options:

A.

Unified security policies require an advanced feature license.

B.

Unified security policies are evaluated after global security policies.

C.

Traffic can initially match multiple unified security policies.

D.

APPID results are used to determine the final security policy

Page: 1 / 7
Total 98 questions