ExamGecko
Home Home / Juniper / JN0-231

Juniper JN0-231 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Which three operating systems are supported for installing and running Juniper Secure Connect client software? (Choose three.)

A.
Windows 7
A.
Windows 7
Answers
B.
Android
B.
Android
Answers
C.
Windows 10
C.
Windows 10
Answers
D.
Linux
D.
Linux
Answers
E.
macOS
E.
macOS
Answers
Suggested answer: A, C, E

Explanation:

Juniper Secure Connect client software is supported on the following three operating systems:

Windows 7, Windows 10, and macOS. For more information, please refer to the Juniper Secure Connect Administrator Guide, which can be found on Juniper's website. The guide states: "The Juniper Secure Connect client is supported on Windows 7, Windows 10, and macOS." It also provides detailed instructions on how to install and configure the software for each of these operating systems.

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

A.
integrated user firewall
A.
integrated user firewall
Answers
B.
screens
B.
screens
Answers
C.
802.1X
C.
802.1X
Answers
D.
Juniper ATP
D.
Juniper ATP
Answers
Suggested answer: D

Explanation:

In this scenario, you should implement Juniper ATP (Advanced Threat Prevention). Juniper ATP provides user-based enforcement of security policies without the requirement of certificates and supplicant software. It uses a combination of behavioral analytics, sandboxing, and threat intelligence to detect and respond to advanced threats in real time. Juniper ATP provides robust protection against targeted attacks, malicious insiders, and zero-day malware. For more information, please refer to the Juniper ATP product page on Juniper's website.

Which statement is correct about static NAT?

A.
Static NAT supports port translation.
A.
Static NAT supports port translation.
Answers
B.
Static NAT rules are evaluated after source NAT rules.
B.
Static NAT rules are evaluated after source NAT rules.
Answers
C.
Static NAT implements unidirectional one-to-one mappings.
C.
Static NAT implements unidirectional one-to-one mappings.
Answers
D.
Static NAT implements unidirectional one-to-many mappings.
D.
Static NAT implements unidirectional one-to-many mappings.
Answers
Suggested answer: C

Explanation:

Static NAT (Network Address Translation) is a type of NAT that maps a public IP address to a private IP address. With static NAT, a one-to-one mapping is created between a public IP address and a private IP address. This means that a single public IP address is mapped to a single private IP address, and all incoming traffic to the public IP address is forwarded to the private IP address.

Reference: https://www.juniper.net/documentation/en_US/junos/topics/concept/nat-overview.html

In J-Web. the management and loopback address configuration option allows you to configure which area?

A.
the IP address of the primary Gigabit Ethernet port
A.
the IP address of the primary Gigabit Ethernet port
Answers
B.
the IP address of the Network Time Protocol server
B.
the IP address of the Network Time Protocol server
Answers
C.
the CIDR address
C.
the CIDR address
Answers
D.
the IP address of the device management port
D.
the IP address of the device management port
Answers
Suggested answer: D

Explanation:

J-Web is a web-based interface for configuring and managing Juniper devices. The management and loopback address configuration option in J-Web allows you to configure the IP address of the device management port, which is used to remotely access and manage the device.

You are installing a new SRX Series device and you are only provided one IP address from your ISP.

In this scenario, which NAT solution would you implement?

A.
pool-based NAT with PAT
A.
pool-based NAT with PAT
Answers
B.
pool-based NAT with address shifting
B.
pool-based NAT with address shifting
Answers
C.
interface-based source NAT
C.
interface-based source NAT
Answers
D.
pool-based NAT without PAT
D.
pool-based NAT without PAT
Answers
Suggested answer: C

Which two statements are correct about IPsec security associations? (Choose two.)

A.
IPsec security associations are bidirectional.
A.
IPsec security associations are bidirectional.
Answers
B.
IPsec security associations are unidirectional.
B.
IPsec security associations are unidirectional.
Answers
C.
IPsec security associations are established during IKE Phase 1 negotiations.
C.
IPsec security associations are established during IKE Phase 1 negotiations.
Answers
D.
IPsec security associations are established during IKE Phase 2 negotiations.
D.
IPsec security associations are established during IKE Phase 2 negotiations.
Answers
Suggested answer: A, D

Explanation:

The two statements that are correct about IPsec security associations are that they are bidirectional and that they are established during IKE Phase 2 negotiations. IPsec security associations are bidirectional, meaning that they provide security for both incoming and outgoing traffic. IPsec security associations are established during IKE Phase 2 negotiations, which negotiates the security parameters and establishes the security association between the two peers. For more information, please refer to the Juniper Networks IPsec VPN Configuration Guide, which can be found on Juniper's website.

You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution.

Which solution satisfies the requirement?

A.
Juniper Sky Enterprise
A.
Juniper Sky Enterprise
Answers
B.
J-Web
B.
J-Web
Answers
C.
Junos Secure Connect
C.
Junos Secure Connect
Answers
D.
Junos Space
D.
Junos Space
Answers
Suggested answer: D

Explanation:

Junos Space is a management platform that provides a single pane of glass view of SRX Series devices dispersed throughout locations in your organization. It provides visibility into the security policies of the devices, allowing you to quickly identify and respond to security threats. Additionally, it provides the ability to manage multiple devices remotely and in real-time, enabling you to quickly deploy and update security policies on all devices. For more information, please refer to the Juniper Networks Junos Space Network Director User Guide, which can be found on Juniper's website.

What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?

A.
3
A.
3
Answers
B.
4
B.
4
Answers
C.
2
C.
2
Answers
D.
5
D.
5
Answers
Suggested answer: C

Explanation:

The number of concurrent Secure Connect user licenses that an SRX Series device has by default is 2.

Secure Connect is a feature of Juniper SRX Series devices that allows you to securely connect to remote networks via IPsec VPN tunnels. Each SRX Series device comes with two concurrent Secure Connect user licenses by default, meaning that it can support up to two simultaneous IPsec VPN connections. For more information, please refer to the Juniper Networks SRX Series Services Gateways Security Configuration Guide, which can be found on Juniper's website.

You need to collect the serial number of an SRX Series device to replace it. Which command will accomplish this task?

A.
show chassis hardware
A.
show chassis hardware
Answers
B.
show system information
B.
show system information
Answers
C.
show chassis firmware
C.
show chassis firmware
Answers
D.
show chassis environment
D.
show chassis environment
Answers
Suggested answer: A

Explanation:

The correct command to collect the serial number of an SRX Series device is the show chassis hardware command [1]. This command will return the serial number of the device, along with other information about the device such as the model number, part number, and version.

This command is available in Junos OS. More information about the show chassis hardware command can be found in the Juniper Networks technical documentation here [1]:

https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/showchassis-hardware.html.

Which statement is correct about Junos security policies?

A.
Security policies enforce rules that should be applied to traffic transiting an SRX Series device.
A.
Security policies enforce rules that should be applied to traffic transiting an SRX Series device.
Answers
B.
Security policies determine which users are allowed to access an SRX Series device.
B.
Security policies determine which users are allowed to access an SRX Series device.
Answers
C.
Security policies control the flow of internal traffic within an SRX Series device.
C.
Security policies control the flow of internal traffic within an SRX Series device.
Answers
D.
Security policies identity groups of users that have access to different features on an SRX Series device.
D.
Security policies identity groups of users that have access to different features on an SRX Series device.
Answers
Suggested answer: A

Explanation:

The correct statement about Junos security policies is that they enforce rules that should be applied to traffic transiting an SRX Series device. Security policies control the flow of traffic between different zones on the SRX Series device, and dictate which traffic is allowed or denied. They can also specify which application and service requests are allowed or blocked. More information about Junos security policies can be found in the Juniper Networks technical documentation here:

https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/security-policiesoverview.html.

Total 101 questions
Go to page: of 11