Juniper JN0-231 Practice Test - Questions Answers, Page 2

List of questions
Question 11

Which statement about global NAT address persistence is correct?
Use the persistent-nat feature to ensure that all requests from the same internal transport address are mapped to the same reflexive transport address (the public IP address and port created by the NAT device closest to the STUN server).
The source NAT rule action can use a source NAT pool (with or without port translation) or an egress interface.
Question 12

You are asked to configure your SRX Series device to block all traffic from certain countries. The solution must be automatically updated as IP prefixes become allocated to those certain countries.
Which Juniper ATP solution will accomplish this task?
Juniper ATP Geo IP can help to accomplish this task by using geolocation services to determine the geographical location of IP addresses. As IP prefixes get allocated to the countries that you have specified, the Geo IP solution will automatically update the configured firewall policies to block any traffic that is coming from those specific countries.
This is a great solution for blocking specific countries - as it will allow for a more personalized and targeted approach to firewall policies - and thus, to increase the effectiveness of the solution at blocking potential malicious traffic.
Question 13

Which two statements are correct about IKE security associations? (Choose two.)
Question 14

You want to deploy a NAT solution.
In this scenario, which solution would provide a static translation without PAT?
Translation of the original source IP address to an IP address from a user-defined address pool by shifting the IP addresses. This type of translation is one-to-one, static, and without port address translation. If the original source IP address range is larger than the IP address range in the userdefined pool, untranslated packets are dropped.
https://www.juniper.net/documentation/us/en/software/junos/nat/topics/topic-map/nat-securitysource-and-source-pool.html
Question 15

Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?
Malware Sandboxing
Detect and stop zero-day and commodity malware within web, email, data center, and application traffic targeted for Windows, Mac, and IoT devices.
https://www.juniper.net/us/en/products/security/advanced-threat-prevention.html
Question 16

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.
Which NAT configuration is appropriate in this scenario?
https://www.juniper.net/documentation/en_US/day-one-books/nat-and-pat-en.htmlAnd the specific text that would support the above answer is as follows: "Static NAT, which requiresmanual configuration, is often the most appropriate configuration for mapping one internal addressto one external address."
Question 17

You want to provide remote access to an internal development environment for 10 remote developers.
Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)
Question 18

You are deploying an SRX Series firewall with multiple NAT scenarios.
In this situation, which NAT scenario takes priority?
This is because the interface NAT would allow the connections to pass through the firewall - and thus, would ensure that the appropriate ports are open in order to allow for the connections to be established.
This is a really important step in order to ensure that all of the appropriate traffic is allowed through the SRX Series firewall - and thus, it must be a priority when deploying the firewall.
Question 19

Your ISP gives you an IP address of 203.0.113.0/27 and informs you that your default gateway is 203.0.113.1. You configure destination NAT to your internal server, but the requests sent to the webserver at 203.0.113.5 are not arriving at the server.
In this scenario, which two configuration features need to be added? (Choose two.)
Question 20

Click the Exhibit button.
Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)
Question