ExamGecko
Home Home / Juniper / JN0-1332

Juniper JN0-1332 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Which firewall service is used as a first line of defense and often used by a security device to protect itself?

A.
intrusion prevention system
A.
intrusion prevention system
Answers
B.
unified Threat management
B.
unified Threat management
Answers
C.
network address translation
C.
network address translation
Answers
D.
stateless firewall filter
D.
stateless firewall filter
Answers
Suggested answer: A

You arc asked to proud a design proposal to secure a service provider's network against IP spoofing As part of your design, you must ensure that only traffic sourced from the same subnet is followed on the customer-facing interfaces.

Which solution will satisfy this requirement?

A.
BGP with source of origin community
A.
BGP with source of origin community
Answers
B.
unicast RPF with strict mode
B.
unicast RPF with strict mode
Answers
C.
unicast RPF with loose mode
C.
unicast RPF with loose mode
Answers
D.
BGP labeled-unicast using the resolve-vpn option
D.
BGP labeled-unicast using the resolve-vpn option
Answers
Suggested answer: B

You are designing a central management solution Your customer wants a togging solution that will support the collection of up to 10.000 events per second from many SRX Series devices that will be deployed m their network. In this scenario. which solution should you include in your design proposal?

A.
Log Oi rector
A.
Log Oi rector
Answers
B.
Network Director
B.
Network Director
Answers
C.
Contrail Insights
C.
Contrail Insights
Answers
D.
Contrail Server Orchestration
D.
Contrail Server Orchestration
Answers
Suggested answer: A

You want to reduce the possibility of your data center's server becoming an unwilling participant in a DDoS attack When tvA3 features should you use on your SRX Series devices to satisfy this requirement? (Choose two.)

A.
dynamic IPsec tunnels
A.
dynamic IPsec tunnels
Answers
B.
Juniper ATP Cloud GeolP
B.
Juniper ATP Cloud GeolP
Answers
C.
UTMWebtaering
C.
UTMWebtaering
Answers
D.
Juniper ATP Cloud CC feeds
D.
Juniper ATP Cloud CC feeds
Answers
Suggested answer: A, D

Refer to the exhibit.

You arc designing a security solution using an SRX Series chassis duster in two separate buildings In this scenario, what are three considerations? (Choose three )

A.
The switches connecting to interface fab1 must support jumbo frames
A.
The switches connecting to interface fab1 must support jumbo frames
Answers
B.
Latency on the fabric path must be under 1000 ms
B.
Latency on the fabric path must be under 1000 ms
Answers
C.
Latency on the control path must be under 100 ms
C.
Latency on the control path must be under 100 ms
Answers
D.
The switches connecting to interface fxp: must support jumbo frames
D.
The switches connecting to interface fxp: must support jumbo frames
Answers
E.
Both HA Inks must be on physically different switches.
E.
Both HA Inks must be on physically different switches.
Answers
Suggested answer: A, C, D

As part of your service provider WAN network design, you are asked to create a design that secures BGP communication .

In this scenario, what are two reasons you would choose BGP Generated TTL Security Mechanism (GTSM)? (Choose two.)

A.
You have an automated method of rotating MD5 hashes on each router.
A.
You have an automated method of rotating MD5 hashes on each router.
Answers
B.
All of your router BGP connections are point-to-multipoint.
B.
All of your router BGP connections are point-to-multipoint.
Answers
C.
AlI of your router BGP connections are point-to-point
C.
AlI of your router BGP connections are point-to-point
Answers
D.
You do not have an easy method of rotating MD5 hashes on each router
D.
You do not have an easy method of rotating MD5 hashes on each router
Answers
Suggested answer: B, D

Which two statements describe Juniper ATP Cloud? (Choose two)

A.
Juniper ATP Cloud can use a sandbox to detect threats that use evasion techniques.
A.
Juniper ATP Cloud can use a sandbox to detect threats that use evasion techniques.
Answers
B.
Juniper ATP Cloud runs mime with network traffic to Nock all traffic before reaching endpoint.
B.
Juniper ATP Cloud runs mime with network traffic to Nock all traffic before reaching endpoint.
Answers
C.
Juniper ATP Cloud provides protection against zero-day threats
C.
Juniper ATP Cloud provides protection against zero-day threats
Answers
D.
Juniper ATP Cloud is an added app that must be instated with Security Director
D.
Juniper ATP Cloud is an added app that must be instated with Security Director
Answers
Suggested answer: A, D

When two security services process a packet whether it is being processed in the first-packet path or the fast path? (Choose two.)

A.
screen options
A.
screen options
Answers
B.
ALG
B.
ALG
Answers
C.
route lookup
C.
route lookup
Answers
D.
policy lookup
D.
policy lookup
Answers
Suggested answer: C, D

Physical security devices are ''blind'' to which type of traffic?

A.
bare metal server to VM
A.
bare metal server to VM
Answers
B.
private VLAN
B.
private VLAN
Answers
C.
intra-server traffic
C.
intra-server traffic
Answers
D.
management
D.
management
Answers
Suggested answer: B

Which two steps should be included in your security design process? (Choose two )

A.
Define an overall routing strategy
A.
Define an overall routing strategy
Answers
B.
identity external attackers
B.
identity external attackers
Answers
C.
Identify permitted communications
C.
Identify permitted communications
Answers
D.
Identify security requirements for the customer's organization
D.
Identify security requirements for the customer's organization
Answers
Suggested answer: B, C
Total 65 questions
Go to page: of 7