ExamGecko
Home / Juniper / JN0-1332 / List of questions
Ask Question

Juniper JN0-1332 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Exhibit.

Juniper JN0-1332 image Question 21 50033 09182024210948000000

In the 3-tier VPN design shown in the exhibit, which function are the Campus A and Campus B SRX Series devices performing?

Internet security gateway
Internet security gateway
data center firewall
data center firewall
WAN aggregation
WAN aggregation
VPN bridging
VPN bridging
Suggested answer: A
asked 18/09/2024
Abiola Unegbu
40 questions

Question 22

Report Export Collapse

You are designing a security solution for an existing data center. All traffic most be secured using SRX Series devices, however, you are unable to change the existing IP addressing scheme. Which firewall deployment method satisfies this requirement?

transparent deployment
transparent deployment
two-arm deployment
two-arm deployment
one-arm deployment
one-arm deployment
inline deployment
inline deployment
Suggested answer: A
asked 18/09/2024
Aparna Roy
49 questions

Question 23

Report Export Collapse

Refer to the Exhibit.

Juniper JN0-1332 image Question 23 50035 09182024210948000000

You are asked to provide a proposal for security elements in the service provider network shown in the exhibit. You must provide DOoS protection for Customer A from potential upstream attackers.

Which statements correct in this scenario?

You should implement DDoS protection to drop offending traffic on the edge devices closest to the destination of the attack.
You should implement DDoS protection to drop offending traffic on the edge devices closest to the destination of the attack.
You should implement DDoS protection to drop offending traffic on the edge devices closest to the source of the attack.
You should implement DDoS protection to drop offending traffic on the edge devices closest to the source of the attack.
You should implement DDoS protection to drop offending traffic on the core devices.
You should implement DDoS protection to drop offending traffic on the core devices.
You should implement DDoS protection to drop offending traffic on the customer edge device.
You should implement DDoS protection to drop offending traffic on the customer edge device.
Suggested answer: C
asked 18/09/2024
stephen mark
38 questions

Question 24

Report Export Collapse

You must implement a security solution that uses a central database to authenticate devices without EAP-M05 based on their network interface address. Which solution will accomplish this task'?

static MAC bypass
static MAC bypass
MAC RADIUS
MAC RADIUS
802.1X single secure
802.1X single secure
802.1X multiple
802.1X multiple
Suggested answer: C
asked 18/09/2024
Matt Smith
55 questions

Question 25

Report Export Collapse

You are asked to design an automated vulnerability scanner that can actively check to see which ports are open and report on the findings. Which Junker Networks product would you use in this scenario7

Security Director
Security Director
Log Director
Log Director
Policy Enforcer
Policy Enforcer
JSA
JSA
Suggested answer: C
asked 18/09/2024
Arslan Ibragimov
44 questions

Question 26

Report Export Collapse

When using Contra! networking, security policies are distributed as access control list to which component?

vSwith
vSwith
vSRX
vSRX
vMX
vMX
vRouter
vRouter
Suggested answer: D
asked 18/09/2024
Marcelo Rubio Caiado
45 questions

Question 27

Report Export Collapse

Which automation language would you use to create on-box and off-box scripts for SRX Series devices?

Python
Python
Pert
Pert
Java
Java
Ruby
Ruby
Suggested answer: D
asked 18/09/2024
JIMMY GIOVANNY VARGAS TERAN
43 questions

Question 28

Report Export Collapse

When designing security for the service provider WAN. you are asked to implement unicast reverse path forwarding (uRPF) in this scenario. on which interfaces would you choose to implement loose mode uRPF?

On interfaces where the best forwarding path fee routes is through the receiving interface
On interfaces where the best forwarding path fee routes is through the receiving interface
On interfaces that are user access interfaces
On interfaces that are user access interfaces
On interfaces where all data originates on the same network as that of the router interface
On interfaces where all data originates on the same network as that of the router interface
On interfaces that participate in multihomes environments
On interfaces that participate in multihomes environments
Suggested answer: B
asked 18/09/2024
Ryan John Ricafranca
54 questions

Question 29

Report Export Collapse

You are asked to enable denial of service protection for a webserver behind an SRX Series device In this scenario, which feature would you enable?

screens
screens
App Secure
App Secure
Web filtering
Web filtering
Juniper ATP
Juniper ATP
Suggested answer: D
asked 18/09/2024
efrem perry
50 questions

Question 30

Report Export Collapse

As part of a design requirement you are asked to allow users in a specific department to authenticate only on their laptops and no other devices on the same network port. Which mode of 802 .1X authentication will you use to satisfy this requirement?

multiple
multiple
single-secure
single-secure
single
single
MAC RADIUS
MAC RADIUS
Suggested answer: A
asked 18/09/2024
harinder giri
37 questions
Total 65 questions
Go to page: of 7
Search

Related questions