Juniper JN0-231 Practice Test - Questions Answers, Page 4
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 31
 
                            
                            
                                Which two user authentication methods are supported when using a Juniper Secure Connect VPN?
(Choose two.)
Question 32
 
                            
                            
                                Click the Exhibit button.
Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)
Question 33
 
                            
                            
                                You are monitoring an SRX Series device that has the factory-default configuration applied.
In this scenario, where are log messages sent by default?
Question 34
 
                            
                            
                                When transit traffic matches a security policy, which three actions are available? (Choose three.)
Question 35
 
                            
                            
                                Which two services does Juniper Connected Security provide? (Choose two.)
Question 36
 
                            
                            
                                You are creating Ipsec connections.
In this scenario, which two statements are correct about proxy IDs? (Choose two.)
Question 37
 
                            
                            
                                Which two components are configured for host inbound traffic? (Choose two.)
Question 38
 
                            
                            
                                Which two security features inspect traffic at Layer 7? (Choose two.)
Question 39
 
                            
                            
                                Which two UTM features should be used for tracking productivity and corporate user behavior?
(Choose two.)
Question 40
 
                            
                            
                                What is the order in which malware is detected and analyzed?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question