JN0-1332: Security Design, Specialist
Juniper
Exam Number: JN0-1332
Exam Name: Security Design, Specialist
Length of test: 90 mins
Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.
Exam Language: English
Number of questions in the actual exam: 65 questions
Passing Score: 70%
Topics Covered:
-
Customer Network Design Requirements: Identifying initial network design requirements for Juniper Networks life-cycle service approach, proposal boundaries, and considerations for greenfield and brownfield deployments.
-
Securing the Network: Identifying security design principles for general security design, data center security, campus WAN security, zero-trust security, and secure access service edge (SASE).
-
Network Management or Reliability: Identifying network design considerations for business continuity, high-resiliency design, link- and device-level redundancy, and network automation.
-
Campus and Branch LAN Design: Identifying considerations for wired and wireless LAN designs, including campus LAN design best practices, modular design, subnet and VLAN design, and wireless LAN design phases.
This study guide should help you understand what to expect on the JN0-1332 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.
Related questions
You must secure network access by requiring users to log in through an HTTP browser, while alsoallowing printers to connect to the network using MAC address validation. What will satisfy theserequirements?
What are two considerations when performing a risk assessment for assets in a data center? (Choose two.)
You arc asked to proud a design proposal to secure a service provider's network against IP spoofing As part of your design, you must ensure that only traffic sourced from the same subnet is followed on the customer-facing interfaces.
Which solution will satisfy this requirement?
When using Contra! networking, security policies are distributed as access control list to which component?
You are designing an IP camera solution for your warehouse You must block command and control servers from communicating with the cameras. In this scenario. which two products would you need to include in your design?
(Choose two)
Multiple customers use the shared infrastructure of your data center. These customers require isolation for compliance and security reasons.
What would you do to satisfy this requirement?
You are asked to provide a network design proposal for a service provider As part of this design you must provide a solution that allows the service provider to mitigate DDoS attacks on their customers Which two features will satisfy this requirement? (Choose two)
Which solution would you deploy to accomplish this task?
You are asked to design an automated vulnerability scanner that can actively check to see which ports are open and report on the findings. Which Junker Networks product would you use in this scenario7
You must implement a security solution that uses a central database to authenticate devices without EAP-M05 based on their network interface address. Which solution will accomplish this task'?
Question