ExamGecko
Home Home / Juniper / JN0-1332

Juniper JN0-1332 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











You are designing a service provider network. As part of your design you must ensure that the OSPF, BGP, and RSVP protocol communications are secured using the same authentication method. Which authentication protocol will accomplish this task?

A.
HMAC-MD5
A.
HMAC-MD5
Answers
B.
simple authentication
B.
simple authentication
Answers
C.
SHA-RSA
C.
SHA-RSA
Answers
D.
SHA-256
D.
SHA-256
Answers
Suggested answer: B

You are asked to design security into the configuration of routing protocols on your Junos network to stop rogue neighbors from forming adjacencies for an enterprise WAN What win accomplish this task?

A.
PAP
A.
PAP
Answers
B.
SAML
B.
SAML
Answers
C.
MOS
C.
MOS
Answers
D.
TTLS
D.
TTLS
Answers
Suggested answer: D

You must secure network access by requiring users to log in through an HTTP browser, while alsoallowing printers to connect to the network using MAC address validation. What will satisfy theserequirements?

A.
802. IX multiple supplicant
A.
802. IX multiple supplicant
Answers
B.
MAC RADIUS
B.
MAC RADIUS
Answers
C.
captive portal
C.
captive portal
Answers
D.
guest VLAN
D.
guest VLAN
Answers
Suggested answer: B

You must implement a solution to deploy end-to-end security services on network elements.

Which solution will accomplish this task?

A.
Security Director
A.
Security Director
Answers
B.
Network Director
B.
Network Director
Answers
C.
JSA
C.
JSA
Answers
D.
SRX Series devices
D.
SRX Series devices
Answers
Suggested answer: C

Which two features would provide protection from known malware? (Choose two.)

A.
ALGs
A.
ALGs
Answers
B.
screens
B.
screens
Answers
C.
Junker ATP Cloud
C.
Junker ATP Cloud
Answers
D.
IPS
D.
IPS
Answers
Suggested answer: B, C

A customer wants to understand why Poky Enforcer is included as a part of your network design proposal.

In this situation, which statement is correct

A.
Policy Enforcer submits files to Juniper ATP Cloud for malware scanning
A.
Policy Enforcer submits files to Juniper ATP Cloud for malware scanning
Answers
B.
Policy Enforcer can provide client security based on software installed on the client machine
B.
Policy Enforcer can provide client security based on software installed on the client machine
Answers
C.
Policy Enforcer provides 2ero trust security to ail devices connecting to the network
C.
Policy Enforcer provides 2ero trust security to ail devices connecting to the network
Answers
D.
Policy Enforcer can collect events and news from a wide range of network devices
D.
Policy Enforcer can collect events and news from a wide range of network devices
Answers
Suggested answer: A

In yew network design, you must include a method to block IP addresses from certain countries that will automatically update within the SRX Series devices' security policies.

Which technology would accomplish this goal?

A.
UTM
A.
UTM
Answers
B.
GeolP
B.
GeolP
Answers
C.
dynamic DNS
C.
dynamic DNS
Answers
D.
IPS
D.
IPS
Answers
Suggested answer: C

Which statement about Junos firewall filters is correct?

A.
Firewall filters can be applied as a security policy action
A.
Firewall filters can be applied as a security policy action
Answers
B.
Firewall filters do not operate on stateful flows and they serve no purpose in a next-generation firewall
B.
Firewall filters do not operate on stateful flows and they serve no purpose in a next-generation firewall
Answers
C.
Firewall filters can be applied as the packet enters the security device, and they are stateless.
C.
Firewall filters can be applied as the packet enters the security device, and they are stateless.
Answers
D.
Firewall filters are applied to TCP packets only. and they do not block UDP pockets
D.
Firewall filters are applied to TCP packets only. and they do not block UDP pockets
Answers
Suggested answer: B

According to Juniper Networks, what are two focus points when designing a secure network?

(Choose two.)

A.
performance
A.
performance
Answers
B.
automation
B.
automation
Answers
C.
distributed control
C.
distributed control
Answers
D.
classification
D.
classification
Answers
Suggested answer: A, D

You are designing an IP camera solution for your warehouse You must block command and control servers from communicating with the cameras. In this scenario. which two products would you need to include in your design?

(Choose two)

A.
SRX Series device
A.
SRX Series device
Answers
B.
Security Director
B.
Security Director
Answers
C.
Juniper ATP Cloud
C.
Juniper ATP Cloud
Answers
D.
IPS
D.
IPS
Answers
Suggested answer: C, D
Total 65 questions
Go to page: of 7