ExamGecko
Home Home / Juniper / JN0-231

Juniper JN0-231 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Which two user authentication methods are supported when using a Juniper Secure Connect VPN?

(Choose two.)

A.
certificate-based
A.
certificate-based
Answers
B.
multi-factor authentication
B.
multi-factor authentication
Answers
C.
local authentication
C.
local authentication
Answers
D.
active directory
D.
active directory
Answers
Suggested answer: C, D

Explanation:

"Local Authentication—In local authentication, the SRX Series device validates the user credentials by checking them in the local database. In this method, the administrator handles change of password or resetting of forgotten password.

Here, it requires that an user must remember a new password. This option is not much preferred from a security standpoint.

• External Authentication—In external authentication, you can allow the users to use the same user credentials they use when accessing other resources on the network. In many cases, user credentials are domain logon used for Active Directory or any other LDAP authorization system. This method simplifies user experience and improves the organization's security posture; because you can maintain the authorization system with the regular security policy used by your organization."

https://www.juniper.net/documentation/us/en/software/secure-connect/secure-connectadministrator-guide/topics/topic-map/secure-connect-getting-started.html

Click the Exhibit button.

Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)

A.
UDP traffic matched by the deny-all policy will be silently dropped.
A.
UDP traffic matched by the deny-all policy will be silently dropped.
Answers
B.
TCP traffic matched by the reject-all policy will have a TCP RST sent.
B.
TCP traffic matched by the reject-all policy will have a TCP RST sent.
Answers
C.
TCP traffic matched from the zone trust is allowed by the permit-all policy.
C.
TCP traffic matched from the zone trust is allowed by the permit-all policy.
Answers
D.
UDP traffic matched by the reject-all policy will be silently dropped.
D.
UDP traffic matched by the reject-all policy will be silently dropped.
Answers
Suggested answer: A, B

You are monitoring an SRX Series device that has the factory-default configuration applied.

In this scenario, where are log messages sent by default?

A.
Junos Space Log Director
A.
Junos Space Log Director
Answers
B.
Junos Space Security Director
B.
Junos Space Security Director
Answers
C.
to a local syslog server on the management network
C.
to a local syslog server on the management network
Answers
D.
to a local log file named messages
D.
to a local log file named messages
Answers
Suggested answer: C

When transit traffic matches a security policy, which three actions are available? (Choose three.)

A.
Allow
A.
Allow
Answers
B.
Discard
B.
Discard
Answers
C.
Deny
C.
Deny
Answers
D.
Reject
D.
Reject
Answers
E.
Permit
E.
Permit
Answers
Suggested answer: C, D, E

Which two services does Juniper Connected Security provide? (Choose two.)

A.
protection against zero-day threats
A.
protection against zero-day threats
Answers
B.
IPsec VPNs
B.
IPsec VPNs
Answers
C.
Layer 2 VPN tunnels
C.
Layer 2 VPN tunnels
Answers
D.
inline malware blocking
D.
inline malware blocking
Answers
Suggested answer: A, D

You are creating Ipsec connections.

In this scenario, which two statements are correct about proxy IDs? (Choose two.)

A.
Proxy IDs are used to configure traffic selectors.
A.
Proxy IDs are used to configure traffic selectors.
Answers
B.
Proxy IDs are optional for Phase 2 session establishment.
B.
Proxy IDs are optional for Phase 2 session establishment.
Answers
C.
Proxy IDs must match for Phase 2 session establishment.
C.
Proxy IDs must match for Phase 2 session establishment.
Answers
D.
Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.
D.
Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.
Answers
Suggested answer: A, B

Which two components are configured for host inbound traffic? (Choose two.)

A.
zone
A.
zone
Answers
B.
logical interface
B.
logical interface
Answers
C.
physical interface
C.
physical interface
Answers
D.
routing instance
D.
routing instance
Answers
Suggested answer: A, B

Which two security features inspect traffic at Layer 7? (Choose two.)

A.
IPS/IDP
A.
IPS/IDP
Answers
B.
security zones
B.
security zones
Answers
C.
application firewall
C.
application firewall
Answers
D.
integrated user firewall
D.
integrated user firewall
Answers
Suggested answer: A, C

Which two UTM features should be used for tracking productivity and corporate user behavior?

(Choose two.)

A.
the content filtering UTM feature
A.
the content filtering UTM feature
Answers
B.
the antivirus UTM feature
B.
the antivirus UTM feature
Answers
C.
the Web filtering UTM feature
C.
the Web filtering UTM feature
Answers
D.
the antispam UTM feature
D.
the antispam UTM feature
Answers
Suggested answer: A, C

What is the order in which malware is detected and analyzed?

A.
antivirus scanning –> cache lookup –> dynamic analysis –> static analysis
A.
antivirus scanning –> cache lookup –> dynamic analysis –> static analysis
Answers
B.
cache lookup –> antivirus scanning –> static analysis –> dynamic analysis
B.
cache lookup –> antivirus scanning –> static analysis –> dynamic analysis
Answers
C.
antivirus scanning –> cache lookup –> static analysis –> dynamic analysis
C.
antivirus scanning –> cache lookup –> static analysis –> dynamic analysis
Answers
D.
cache lookup –> static analysis –> dynamic analysis –> antivirus scanning
D.
cache lookup –> static analysis –> dynamic analysis –> antivirus scanning
Answers
Suggested answer: B
Total 101 questions
Go to page: of 11