ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Exhibit

You are asked to ensure that servers running the Ubuntu OS will not be able to update automatically by blocking their access at the SRX firewall. You have configured a unified security policy named Blockuburrtu, but it is not blocking the updates to the OS.

Referring to the exhibit which statement will block the Ubuntu OS updates?

A.
Move the Blockubuntu policy after the Allowweb policy.
A.
Move the Blockubuntu policy after the Allowweb policy.
Answers
B.
Configure the Blockubuntu policy with the junos-https application parameter.
B.
Configure the Blockubuntu policy with the junos-https application parameter.
Answers
C.
Change the default policy to permit-all.
C.
Change the default policy to permit-all.
Answers
D.
Configure the Allowweb policy to have a dynamic application of any.
D.
Configure the Allowweb policy to have a dynamic application of any.
Answers
Suggested answer: B

Exhibit

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

A.
Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.
A.
Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.
Answers
B.
Execute the Junos commit full command to override the error and apply the configuration.
B.
Execute the Junos commit full command to override the error and apply the configuration.
Answers
C.
Create a custom application named http at the [edit applications] hierarchy.
C.
Create a custom application named http at the [edit applications] hierarchy.
Answers
D.
Modify the security policy to use the built-in Junos-http applications.
D.
Modify the security policy to use the built-in Junos-http applications.
Answers
Suggested answer: C, D

Explanation:

The error message indicates that the Junos-http application is not defined, so you need to either create a custom application or modify the security policy to use the built-in Junos-http application. Doing either of these will allow you to successfully commit the configuration.

Which two statements are correct about AppTrack? (Choose two.)

A.
AppTrack can be configured for any defined logical system on an SRX Series device.
A.
AppTrack can be configured for any defined logical system on an SRX Series device.
Answers
B.
AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.
B.
AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.
Answers
C.
AppTrack collects traffic flow information including byte, packet, and duration statistics.
C.
AppTrack collects traffic flow information including byte, packet, and duration statistics.
Answers
D.
AppTrack can only be configured in the main logical system on an SRX Series device.
D.
AppTrack can only be configured in the main logical system on an SRX Series device.
Answers
Suggested answer: A, C

Explanation:

AppTrack is a feature that allows you to monitor and analyze the application traffic on your SRX Series device. It can be configured for any defined logical system, which is a virtual router or switch within a physical device. AppTrack collects statistics such as bytes, packets, and duration for each application flow and displays them in reports or logs. AppTrack does not identify or block malicious traffic, that is the function of AppSecure or IDP/IPS.Reference:=JNCIS-SEC Certification,Open Learning - Security, Specialist (JNCIS-SEC),Application Security Theory

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.

How do you solve this problem?

A.
Load a known good, but expired. CA certificate onto the SRX Series device.
A.
Load a known good, but expired. CA certificate onto the SRX Series device.
Answers
B.
Install a new SRX Series device to act as the client proxy
B.
Install a new SRX Series device to act as the client proxy
Answers
C.
Reboot the SRX Series device.
C.
Reboot the SRX Series device.
Answers
D.
Import the existing certificate to each client device.
D.
Import the existing certificate to each client device.
Answers
Suggested answer: D

Explanation:

SSL client protection proxy is a feature that allows you to decrypt and inspect the SSL traffic from clients to servers. To do this, you need to install a certificate authority (CA) certificate on the SRX Series device and import the same certificate to each client device. This way, the SRX Series device can act as a proxy between the client and the server and perform security checks on the decrypted traffic. If the client device does not have the certificate installed, it will receive an error message like the one shown in the exhibit.Reference:=JNCIS-SEC Certification,Open Learning - Security, Specialist (JNCIS-SEC),SSL Proxy Configuration

When a security policy is modified, which statement is correct about the default behavior for active sessions allowed by that policy?

A.
The active sessions allowed by the policy will be dropped.
A.
The active sessions allowed by the policy will be dropped.
Answers
B.
Only policy changes that involve modification of the action field will cause the active sessions affected by the change to be dropped.
B.
Only policy changes that involve modification of the action field will cause the active sessions affected by the change to be dropped.
Answers
C.
Only policy changes that involve modification of the application will cause the active sessions affected by the change to be dropped.
C.
Only policy changes that involve modification of the application will cause the active sessions affected by the change to be dropped.
Answers
D.
The active sessions allowed by the policy will continue unchanged.
D.
The active sessions allowed by the policy will continue unchanged.
Answers
Suggested answer: D

Explanation:

When you modify a security policy on the SRX Series device, the default behavior is that the existing sessions that match the policy will continue unchanged. This means that the policy modification will only affect new sessions that are initiated after the change. However, you can change this behavior by using the clear-policy-session command, which will clear all the sessions that match the modified policy and force them to re-evaluate the new policy.Reference:=JNCIS-SEC Certification,Open Learning - Security, Specialist (JNCIS-SEC),Security Policies (Advanced)

You want to control when cluster failovers occur.

In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)

A.
hearcbeac-interval
A.
hearcbeac-interval
Answers
B.
heartbeac-address
B.
heartbeac-address
Answers
C.
hearcbeat-cos
C.
hearcbeat-cos
Answers
D.
hearcbeac-chreshold
D.
hearcbeac-chreshold
Answers
Suggested answer: A, D

Explanation:

To control when cluster failovers occur, you need to configure two specific parameters on an SRX Series device: heartbeat-interval and heartbeat-threshold. These parameters determine how often the nodes in a cluster exchange heartbeat messages and how many consecutive heartbeats can be missed before a failover is triggered. The heartbeat-interval specifies the time interval in seconds between each heartbeat message. The default value is 1 second and the range is from 0.1 to 10 seconds. The heartbeat-threshold specifies the number of consecutive heartbeats that must be missed before a failover occurs. The default value is 3 and the range is from 2 to 255.Reference:=Configuring Chassis Clustering on SRX Series Devices,Chassis Cluster Redundancy Group Failover

You administer a JSA host and want to include a rule that sets a threshold for excessive firewall denies and sends an SNMP trap after receiving related syslog messages from an SRX Series firewall.

Which JSA rule type satisfies this requirement?

A.
common
A.
common
Answers
B.
offense
B.
offense
Answers
C.
flow
C.
flow
Answers
D.
event
D.
event
Answers
Suggested answer: D

Explanation:

To include a rule that sets a threshold for excessive firewall denies and sends an SNMP trap after receiving related syslog messages from an SRX Series firewall, you need to use an event rule type in JSA. An event rule type allows you to create custom rules based on the events that are collected and normalized by JSA from various sources, such as firewalls, routers, switches, servers, and so on. You can define the conditions, tests, and actions for an event rule, such as matching a specific event name, setting a threshold for the number of occurrences, and sending an SNMP trap to a specified host.Reference:=Creating a Custom Rule,Customizing the SNMP Trap Output

Which two statements about the DNS ALG are correct? (Choose two.)

A.
The DNS ALG supports DDNS.
A.
The DNS ALG supports DDNS.
Answers
B.
The DNS ALG supports VPN tunnels.
B.
The DNS ALG supports VPN tunnels.
Answers
C.
The DNS ALG performs DNS doctoring.
C.
The DNS ALG performs DNS doctoring.
Answers
D.
The DNS ALG does not support NAT.
D.
The DNS ALG does not support NAT.
Answers
Suggested answer: A, C

Explanation:

The DNS ALG is an application layer gateway that handles data associated with locating and translating domain names into IP addresses. It runs on port 53 and monitors DNS query and reply packets. Two statements about the DNS ALG that are correct are:

The DNS ALG supports DDNS: DDNS is Dynamic DNS, which is a method of updating DNS records in real time to reflect changes in network configurations or hostnames. The DNS ALG can process DDNS messages differently from DNS messages and perform address translation in the query part of the message.

The DNS ALG performs DNS doctoring: DNS doctoring is a technique of modifying the DNS reply packets to replace the original IP addresses with translated IP addresses that are suitable for the destination network. This allows the clients to access servers that are located behind NAT devices or in different networks.

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

A.
Adaptive Threat Profiling
A.
Adaptive Threat Profiling
Answers
B.
Juniper Secure Analytics
B.
Juniper Secure Analytics
Answers
C.
Juniper Identity Management Service
C.
Juniper Identity Management Service
Answers
D.
Intrusion Prevention System
D.
Intrusion Prevention System
Answers
Suggested answer: B

Explanation:

The Juniper Networks solution that will accomplish the task of alerting if the wrong password is used more than three times on a single device within five minutes is Juniper Secure Analytics (JSA). JSA is a security intelligence platform that collects, analyzes, and correlates network data from various sources, such as firewalls, routers, switches, servers, and applications. JSA can detect and respond to threats, anomalies, and vulnerabilities in real time using rules, offenses, reports, and dashboards. JSA can also integrate with JIMS (Juniper Identity Management Service) to obtain user identity information from Active Directory domains or syslog sources. JSA can use this information to create custom rules that trigger offenses or alerts based on user behavior or activity, such as failed login attempts or password changes.

While working on an SRX firewall, you execute the show security policies policy-name <name> detail command.

Which function does this command accomplish?

A.
It displays details about the default security policy.
A.
It displays details about the default security policy.
Answers
B.
It identifies the different custom policies enabled.
B.
It identifies the different custom policies enabled.
Answers
C.
It shows the system log files for the local SRX Series device.
C.
It shows the system log files for the local SRX Series device.
Answers
D.
It shows policy counters for a configured policy.
D.
It shows policy counters for a configured policy.
Answers
Suggested answer: D

Explanation:

The function that the show security policies policy-name <name> detail command accomplishes is showing policy counters for a configured policy. Policy counters are statistics that indicate how many times a policy has been matched by traffic and what actions have been taken by the policy. Policy counters can help you monitor and troubleshoot the performance and effectiveness of your security policies. The show security policies policy-name <name> detail command displays detailed information about a specific policy, such as its source zone, destination zone, description, state, hit count, byte count, packet count, action count, and session count.

Total 98 questions
Go to page: of 10