ExamGecko
Home Home / Juniper / JN0-1332

Juniper JN0-1332 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











You are asked to deploy multiple kiosk locations around the country. Their locations will change frequently and will need to access services in the corporate data center as well as other kiosk locations You need a central key location In this scenario, which solution would you deploy?

A.
Mesh VPN
A.
Mesh VPN
Answers
B.
Group VPN
B.
Group VPN
Answers
C.
Juniper Secure Connect
C.
Juniper Secure Connect
Answers
D.
Auto VPN
D.
Auto VPN
Answers
Suggested answer: D

Which two statements are true about WAN security considerations? (Choose two.)

A.
MACsec increases protection on alt WAN types
A.
MACsec increases protection on alt WAN types
Answers
B.
Provider VPN circuit require iPsec
B.
Provider VPN circuit require iPsec
Answers
C.
internal connections are susceptible to fragmentation
C.
internal connections are susceptible to fragmentation
Answers
D.
IPsec increases protection on all WAN types
D.
IPsec increases protection on all WAN types
Answers
Suggested answer: C

You are designing a security solution that includes SRX Series firewalls in a chassis cluster.

In this scenario. which two dements must be part of the design? (Choose two.)

A.
The physical interface on each SRX Series device making up the reth interface must be in the same L2 domain
A.
The physical interface on each SRX Series device making up the reth interface must be in the same L2 domain
Answers
B.
The physical interface on each SRX Series device making up the reth interface must be in separate L2 domains
B.
The physical interface on each SRX Series device making up the reth interface must be in separate L2 domains
Answers
C.
The duster ID must be the same on both SRX Series devices
C.
The duster ID must be the same on both SRX Series devices
Answers
D.
The node 10 must be the same on both SRX Series devices
D.
The node 10 must be the same on both SRX Series devices
Answers
Suggested answer: B

You are designing Enterprise WAN attachments and want to follows Jumper recommended security practices In 0*s scenario. which two statements are correct? (Choose two.)

A.
Authentication authorization and accounting should be implemented on network resources
A.
Authentication authorization and accounting should be implemented on network resources
Answers
B.
The branch CPE should be configured to all outbound Ml:
B.
The branch CPE should be configured to all outbound Ml:
Answers
C.
Printer traffic should be segmented from data traffic.
C.
Printer traffic should be segmented from data traffic.
Answers
D.
Network management traffic should be segmented from data traffic
D.
Network management traffic should be segmented from data traffic
Answers
Suggested answer: A, D

You are asked to segment the networks connected to an SRX Series device into distinct logical groups with different security requirements.

How would you accomplish this task?

A.
Define different NAT policies for each network segment.
A.
Define different NAT policies for each network segment.
Answers
B.
Define different security policies for each network segment.
B.
Define different security policies for each network segment.
Answers
C.
Define different intrusion prevention policies for each network segment.
C.
Define different intrusion prevention policies for each network segment.
Answers
D.
Define different security zones for each network segment
D.
Define different security zones for each network segment
Answers
Suggested answer: B

What are two factors you must consider when designing a network for security intelligence? (Choose two.)

A.
the number and model of JSA Series devices
A.
the number and model of JSA Series devices
Answers
B.
the third-party management application
B.
the third-party management application
Answers
C.
the number and model of SRX Series devices
C.
the number and model of SRX Series devices
Answers
D.
the Junos OS version
D.
the Junos OS version
Answers
Suggested answer: B

Multiple customers use the shared infrastructure of your data center. These customers require isolation for compliance and security reasons.

What would you do to satisfy this requirement?

A.
Isolate each customer by using different physical hard//are
A.
Isolate each customer by using different physical hard//are
Answers
B.
Deploy multiple physical security control points
B.
Deploy multiple physical security control points
Answers
C.
Deploy a single logical security control point.
C.
Deploy a single logical security control point.
Answers
D.
Place each customers VLANs separate virtual router
D.
Place each customers VLANs separate virtual router
Answers
Suggested answer: C

Your network design requires that you ensure privacy between WAN endpoints.

Which transport technology requires an IPsec overlay to satisfy this requirement?

A.
L3VPN
A.
L3VPN
Answers
B.
leased line
B.
leased line
Answers
C.
internet
C.
internet
Answers
D.
L2VPN
D.
L2VPN
Answers
Suggested answer: A

As part of your design to secure a service provider WAN. you are asked to design a destination-based remote triggered black hole (RTBH) solution What arc two reasons for using this design? (Choose two)

A.
The attack is focused on a single IP address
A.
The attack is focused on a single IP address
Answers
B.
You do not know the source address of DDoS packets
B.
You do not know the source address of DDoS packets
Answers
C.
The attack comes from a limited number of source IP addresses
C.
The attack comes from a limited number of source IP addresses
Answers
D.
You want to ensure that the destination IP remains reachable
D.
You want to ensure that the destination IP remains reachable
Answers
Suggested answer: D

As part of a high availably design for interfaces on an SRX chassis cluster, you are asked to deliver a design that provides both link redundancy and node redundancy What would you use to satisfy the requirement?

A.
MC-LAG interfaces
A.
MC-LAG interfaces
Answers
B.
LAG interfaces
B.
LAG interfaces
Answers
C.
reth interfaces
C.
reth interfaces
Answers
D.
reth LAG interfaces
D.
reth LAG interfaces
Answers
Suggested answer: B
Total 65 questions
Go to page: of 7