ExamGecko
Home Home / Juniper / JN0-231

Juniper JN0-231 Practice Test - Questions Answers, Page 8

Question list
Search
Search

You want to block executable files ("exe) from being downloaded onto your network.

Which UTM feature would you use in this scenario?

A.
IPS
A.
IPS
Answers
B.
Web filtering
B.
Web filtering
Answers
C.
content filtering
C.
content filtering
Answers
D.
antivirus
D.
antivirus
Answers
Suggested answer: B

Explanation:

According to the Juniper Networks official JNCIA-SEC Exam Guide, web filtering is a feature used to control access to web content, including the ability to block specific types of files.

In the scenario mentioned, you want to block executable files from being downloaded, which can be accomplished by using web filtering. The feature allows administrators to configure policies that block specific file types, including "exe" files, from being downloaded.

Reference:

Juniper Networks JNCIA-SEC Exam Guide:

https://www.juniper.net/training/certification/certification-exam-guides/jncia-sec-exam-guide/

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

A.
IDP signature feed
A.
IDP signature feed
Answers
B.
C&C cloud feed
B.
C&C cloud feed
Answers
C.
infected host cloud feed
C.
infected host cloud feed
Answers
D.
US CERT threat feed
D.
US CERT threat feed
Answers
Suggested answer: A, B

Explanation:

The Juniper ATP Cloud feed analysis components are the IDP signature feed and the C&C cloud feed.

The IDP signature feed provides a database of signatures from known malicious traffic, while the C&C cloud feed provides the IP addresses of known command and control servers. The infected host cloud feed and US CERT threat feed are not components of the Juniper ATP Cloud feed analysis.

To learn more about the Juniper ATP Cloud feed analysis components, refer to the Juniper Networks Security Automation and Orchestration (SAO) official documentation, which can be found at

https://www.juniper.net/documentation/en_US/sao/topics/concept/security-automation-andorchestration-overview.html. The documentation provides an overview of the SAO platform and an in-depth look at the various components of the

Juniper ATP Cloud feed analysis.

Which two statements are correct about global policies? (Choose two.)

A.
Global policies are evaluated after default policies.
A.
Global policies are evaluated after default policies.
Answers
B.
Global policies do not have to reference zone context.
B.
Global policies do not have to reference zone context.
Answers
C.
Global policies are evaluated before default policies.
C.
Global policies are evaluated before default policies.
Answers
D.
Global policies must reference zone contexts.
D.
Global policies must reference zone contexts.
Answers
Suggested answer: B, C

Explanation:

Global policies are used to define rules for traffic that is not associated with any particular zone. This type of policy is evaluated first, before any rules related to specific zones are evaluated.

For more detailed information about global policies, refer to the Juniper Networks Security Policy Overview guide, which can be found at

https://www.juniper.net/documentation/en_US/junos/topics/reference/security-policyoverview.html. The guide provides an overview of the Juniper Networks security policy architecture, as well as detailed descriptions of the different types of policies and how they are evaluated.

Which statement is correct about Web filtering?

A.
The Juniper Enhanced Web Filtering solution requires a locally managed server.
A.
The Juniper Enhanced Web Filtering solution requires a locally managed server.
Answers
B.
The decision to permit or deny is based on the body content of an HTTP packet.
B.
The decision to permit or deny is based on the body content of an HTTP packet.
Answers
C.
The decision to permit or deny is based on the category to which a URL belongs.
C.
The decision to permit or deny is based on the category to which a URL belongs.
Answers
D.
The client can receive an e-mail notification when traffic is blocked.
D.
The client can receive an e-mail notification when traffic is blocked.
Answers
Suggested answer: C

Explanation:

Web filtering is a feature that allows administrators to control access to websites by categorizing URLs into different categories such as gambling, social networking, or adult content. The decision to permit or deny access to a website is based on the category to which a URL belongs. This is done by comparing the URL against a database of categorized websites and making a decision based on the policy defined by the administrator.

Reference:

Juniper Networks SRX Series Services Gateway Web Filtering Configuration Guide:

https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topicmap/security-services-web-filtering.html

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect?

(Choose two.)

A.
Associate the UTM policy with an address book.
A.
Associate the UTM policy with an address book.
Answers
B.
Associate the UTM policy with a firewall filter.
B.
Associate the UTM policy with a firewall filter.
Answers
C.
Associate the UTM policy with a security policy.
C.
Associate the UTM policy with a security policy.
Answers
D.
Associate the UTM feature profile with a UTM policy.
D.
Associate the UTM feature profile with a UTM policy.
Answers
Suggested answer: C, D

Explanation:

For the UTM feature profile to take effect, it must be associated with a security policy and a UTM policy. The security policy defines the traffic flow and the actions that should be taken on the traffic, while the UTM policy defines the security features to be applied to the traffic, such as antivirus, intrusion prevention, and web filtering. The UTM feature profile provides the necessary configuration for the security features defined in the UTM policy.

Reference:

Juniper Networks SRX Series Services Gateway UTM Configuration Guide:

https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topicmap/security-services-utm.html

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

A.
traffic selector
A.
traffic selector
Answers
B.
perfect forward secrecy
B.
perfect forward secrecy
Answers
C.
st0 interfaces
C.
st0 interfaces
Answers
D.
proxy ID
D.
proxy ID
Answers
Suggested answer: D

Explanation:

The proxy ID is used as a final check to verify the peer before IPsec tunnel establishment. The proxy ID is a combination of local and remote subnet and protocol, and it is used to match the traffic that is to be encrypted. If the proxy IDs match between the two IPsec peers, the IPsec tunnel is established, and the traffic is encrypted.

Reference:

Juniper Networks SRX Series Services Gateway IPsec Configuration Guide:

https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topicmap/security-ipsec-vpn-configuring.html

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

A.
security policy
A.
security policy
Answers
B.
host inbound traffic
B.
host inbound traffic
Answers
C.
application layer gateway
C.
application layer gateway
Answers
D.
screen option
D.
screen option
Answers
Suggested answer: D

Explanation:

A screen option in the SRX Series device can be used to protect clients connected to the device from a SYN flood attack. Screens are security measures that you can use to protect your network from various types of attacks, including SYN floods. A screen option specifies a set of rules to match against incoming packets, and it can take specific actions such as discarding, logging, or allowing the packets based on the rules.

Reference:

Juniper Networks SRX Series Services Gateway Screen Configuration Guide:

https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-screenconfiguring.html

What is the default value of the dead peer detection (DPD) interval for an IPsec VPN tunnel?

A.
20 seconds
A.
20 seconds
Answers
B.
5 seconds
B.
5 seconds
Answers
C.
10 seconds
C.
10 seconds
Answers
D.
40 seconds
D.
40 seconds
Answers
Suggested answer: B

Explanation:

The default value of the dead peer detection (DPD) interval for an IPsec VPN tunnel is 5 seconds. DPD is a mechanism that enables the IPsec device to detect if the peer is still reachable or if the IPsec VPN tunnel is still active. The DPD interval determines how often the IPsec device sends DPD packets to the peer to check the status of the VPN tunnel. A value of 5 seconds is a common default, but the specific value can vary depending on the IPsec device and its configuration.

Reference:

Juniper Networks Technical Documentation: Configuring IPsec VPNs:

https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ipsec-vpnoverview-srx-series.html

What is the main purpose of using screens on an SRX Series device?

A.
to provide multiple ports for accessing security zones
A.
to provide multiple ports for accessing security zones
Answers
B.
to provide an alternative interface into the CLI
B.
to provide an alternative interface into the CLI
Answers
C.
to provide protection against common DoS attacks
C.
to provide protection against common DoS attacks
Answers
D.
to provide information about traffic patterns traversing the network
D.
to provide information about traffic patterns traversing the network
Answers
Suggested answer: C

Explanation:

The main purpose of using screens on an SRX Series device is to provide protection against common Denial of Service (DoS) attacks. Screens help prevent network resources from being exhausted or unavailable by filtering or blocking network traffic based on predefined rules. The screens are implemented as part of the firewall function on the SRX Series device, and they help protect against various types of DoS attacks, such as TCP SYN floods, ICMP floods, and UDP floods.

Reference: https://www.juniper.net/documentation/en_US/junos/topics/concept/security-srxseries-firewall-screen-dos.html

What are two functions of Juniper ATP Cloud? (Choose two.)

A.
malware inspection
A.
malware inspection
Answers
B.
Web content filtering
B.
Web content filtering
Answers
C.
DDoS protection
C.
DDoS protection
Answers
D.
Geo IP feeds
D.
Geo IP feeds
Answers
Suggested answer: A, D

Explanation:

Juniper Advanced Threat Prevention (ATP) Cloud is a security service that helps organizations protect against advanced threats by providing real-time threat intelligence and automated response capabilities. It combines a cloud-based threat intelligence platform with the security capabilities of Juniper Networks security devices to provide comprehensive protection against advanced threats.

The two functions of Juniper ATP Cloud include malware inspection and Geo IP feeds. The malware inspection component provides real-time protection against known and unknown threats by analyzing suspicious files and determining if they are malicious. The Geo IP feeds provide a global view of IP addresses and their associated countries, allowing organizations to identify and block traffic from known malicious countries.

Total 101 questions
Go to page: of 11