ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Your JIMS server is unable to view event logs.

Which two actions would you take to solve this issue? (Choose two.)

A.
Enable the correct host-inbound-traffic rules on the SRX Series devices.
A.
Enable the correct host-inbound-traffic rules on the SRX Series devices.
Answers
B.
Enable remote event log management within Windows Firewall on the necessary Exchange servers.
B.
Enable remote event log management within Windows Firewall on the necessary Exchange servers.
Answers
C.
Enable remote event log management within Windows Firewall on the necessary domain controllers.
C.
Enable remote event log management within Windows Firewall on the necessary domain controllers.
Answers
D.
Enable remote event log management within Windows Firewall on the JIMS server.
D.
Enable remote event log management within Windows Firewall on the JIMS server.
Answers
Suggested answer: B, C

Explanation:

If your JIMS server is unable to view event logs, two actions that you would take to solve this issue are:

Enable remote event log management within Windows Firewall on the necessary Exchange servers: JIMS (Juniper Identity Management Service) is a Windows service that collects user, device, and group information from Active Directory domains or syslog sources and provides it to SRX Series devices for identity-based security policies. JIMS relies on the event logs generated by the domain controllers and Exchange servers to track user logins, logouts, and IP address changes. If the Windows Firewall on the Exchange servers blocks the remote event log management, JIMS cannot access the event logs and obtain the user identity information. Therefore, you need to enable remote event log management within Windows Firewall on the Exchange servers that are configured as event sources in JIMS.

Enable remote event log management within Windows Firewall on the necessary domain controllers: Similarly, if the Windows Firewall on the domain controllers blocks the remote event log management, JIMS cannot access the event logs and obtain the user identity information. Therefore, you need to enable remote event log management within Windows Firewall on the domain controllers that are configured as event sources in JIMS.

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

A.
Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.
A.
Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.
Answers
B.
In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.
B.
In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.
Answers
C.
The fab interface enables configuration synchronization.
C.
The fab interface enables configuration synchronization.
Answers
D.
Heartbeat signals sent on the fab interface monitor the health of the control plane link.
D.
Heartbeat signals sent on the fab interface monitor the health of the control plane link.
Answers
Suggested answer: A, B

Explanation:

The fab interface is a fabric link that connects the two nodes in a chassis cluster. A chassis cluster is a high-availability feature that groups two identical SRX Series devices into a cluster that acts as a single device. The fab interface has two functions:

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization: RTOs are data structures that store information about active sessions, such as source and destination IP addresses, ports, protocols, and security policies. RTOs are exchanged between the nodes on the fab interface to ensure that both nodes have the same session information and can take over the traffic in case of a failover.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface: In an active/active configuration, both nodes in a cluster can process traffic for different redundancy groups (RGs). RGs are collections of interfaces or services that fail over together from one node to another. If traffic needs to transit from one RG to another RG that is active on a different node, it is sent over the fab interface.

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

A.
It decrypts the file in a sandbox.
A.
It decrypts the file in a sandbox.
Answers
B.
It validates the certificates used.
B.
It validates the certificates used.
Answers
C.
It decrypts the data to validate the hash.
C.
It decrypts the data to validate the hash.
Answers
D.
It reviews the timing and frequency of the connections.
D.
It reviews the timing and frequency of the connections.
Answers
Suggested answer: B, D

Explanation:

Encrypted Traffic Insights is a feature that enables the SRX Series firewall and the ATP Cloud to detect malicious threats that are hidden in encrypted traffic without decrypting the traffic. It does so by analyzing the metadata and connection patterns of the encrypted sessions. Two ways that Encrypted Traffic Insights assess the threat of the traffic are:

It validates the certificates used: The SRX Series firewall extracts the server certificate from the encrypted session and compares its signature with a blocklist of known malicious certificates provided by ATP Cloud. If there is a match, the session is blocked and reported as a threat.

It reviews the timing and frequency of the connections: The SRX Series firewall sends the connection details, such as source and destination IP addresses, ports, protocols, and timestamps, to ATP Cloud. ATP Cloud applies behavior analysis and machine learning algorithms to detect anomalous or suspicious patterns of connections, such as high frequency, low duration, or unusual timing.

Click the Exhibit button.

You are validating the configuration template for device access. The commands in the exhibit have been entered to secure IP access to an SRX Series device.

Referring to the exhibit, which two statements are true? (Choose two.)

A.
The device manager can access the device from 192.168.11.248.
A.
The device manager can access the device from 192.168.11.248.
Answers
B.
The loopback interface blocks invalid traffic on its entry into the device.
B.
The loopback interface blocks invalid traffic on its entry into the device.
Answers
C.
The loopback interface blocks invalid traffic on its exit from the device.
C.
The loopback interface blocks invalid traffic on its exit from the device.
Answers
D.
The device manager can access the device from 10.253.1.2.
D.
The device manager can access the device from 10.253.1.2.
Answers
Suggested answer: B, D

Explanation:

The commands in the exhibit show how to configure a firewall filter on the loopback interface (lo0) of an SRX Series device. The loopback interface is a gateway for all the control traffic that enters the Routing Engine of the device. The firewall filter can be used to monitor and protect this control traffic from various attacks. Two statements that are true based on the exhibit are:

The loopback interface blocks invalid traffic on its entry into the device: The firewall filter applied on lo0 has a term that matches any packet with an invalid source address (such as 0.0.0.0/8 or 127.0.0.0/8) and discards it. This prevents spoofing or DoS attacks using invalid source addresses.

The device manager can access the device from 10.253.1.2: The firewall filter applied on lo0 has a term that matches any packet with a source address of 10.253.1.2 and accepts it. This allows the device manager to access the device from this IP address using protocols such as SSH, Telnet, HTTP, or HTTPS.

Click the Exhibit button.

Which two statements describe the output shown in the exhibit? (Choose two.)

A.
Redundancy group 1 experienced an operational failure.
A.
Redundancy group 1 experienced an operational failure.
Answers
B.
Redundancy group 1 was administratively failed over.
B.
Redundancy group 1 was administratively failed over.
Answers
C.
Node 0 is controlling traffic for redundancy group 1.
C.
Node 0 is controlling traffic for redundancy group 1.
Answers
D.
Node 1 is controlling traffic for redundancy group 1.
D.
Node 1 is controlling traffic for redundancy group 1.
Answers
Suggested answer: B, D

Explanation:

The output shown in the exhibit displays the status of a chassis cluster redundancy group (RG) on an SRX Series device. A chassis cluster RG is a collection of objects, such as interfaces or services, that fail over together from one node to another in case of a failure or manual intervention. A chassis cluster RG can be primary on one node and backup on another node at any given time. Two statements that describe the output shown in the exhibit are:

Redundancy group 1 was administratively failed over: The output shows that redundancy group 1 has ''Manual failover'' set to ''Yes''. This indicates that redundancy group 1 was manually switched from one node to another using the request chassis cluster failover redundancy-group command.

Node 1 is controlling traffic for redundancy group 1: The output shows that node 1 has ''Status'' set to ''Primary'' for redundancy group 1. This means that node 1 is active and controlling traffic for redundancy group 1.

What are two requirements for enabling AppQoE? (Choose two.)

A.
You need two SRX Series device endpoints.
A.
You need two SRX Series device endpoints.
Answers
B.
You need two SRX Series or MX Series device endpoints.
B.
You need two SRX Series or MX Series device endpoints.
Answers
C.
You need an APPID feature license.
C.
You need an APPID feature license.
Answers
D.
You need to configure AppQoE for reverse traffic.
D.
You need to configure AppQoE for reverse traffic.
Answers
Suggested answer: B, C

Explanation:

AppQoE is a feature that enables you to monitor and optimize the quality of experience for applications on your network. It uses application-aware routing and dynamic path selection to choose the best path for each application based on predefined or custom SLA profiles. AppQoE also provides visibility and reporting on application performance and network conditions. Two requirements for enabling AppQoE are:

You need two SRX Series or MX Series device endpoints: AppQoE can be configured between two SRX Series device endpoints or between an SRX Series device and an MX Series device in a hub-and-spoke or full mesh topology. The devices must run the same version of Junos OS and have the same AppQoE configuration.

You need an APPID feature license: AppQoE requires an APPID feature license to be installed on the SRX Series device. The APPID feature license enables application identification and classification, which are essential for AppQoE to work.

How does Juniper ATP Cloud protect a network from zero-day threats?

A.
It uses a cache lookup.
A.
It uses a cache lookup.
Answers
B.
It uses antivirus software.
B.
It uses antivirus software.
Answers
C.
It uses dynamic analysis.
C.
It uses dynamic analysis.
Answers
D.
It uses known virus signatures.
D.
It uses known virus signatures.
Answers
Suggested answer: C

Explanation:

Juniper ATP Cloud is a cloud-based service that provides advanced threat prevention and detection for your network. It integrates with SRX Series firewalls and MX Series routers to analyze files and network traffic for signs of malicious activity. Juniper ATP Cloud protects a network from zero-day threats by using dynamic analysis, which is a method of executing files in a sandbox environment and observing their behavior and network interactions. Dynamic analysis can uncover unknown malware that may evade static analysis or signature-based detection methods.

Regarding static attack object groups, which two statements are true? (Choose two.)

A.
Matching attack objects are automatically added to a custom group.
A.
Matching attack objects are automatically added to a custom group.
Answers
B.
Group membership automatically changes when Juniper updates the IPS signature database.
B.
Group membership automatically changes when Juniper updates the IPS signature database.
Answers
C.
Group membership does not automatically change when Juniper updates the IPS signature database.
C.
Group membership does not automatically change when Juniper updates the IPS signature database.
Answers
D.
You must manually add matching attack objects to a custom group.
D.
You must manually add matching attack objects to a custom group.
Answers
Suggested answer: B, C

Explanation:

static attack object groups are predefined groups of attack objects that are included in Juniper's IPS signature database.These groups do not change automatically when Juniper updates the database2.

You are deploying a new SRX Series device and you need to log denied traffic.

In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)

A.
session-init
A.
session-init
Answers
B.
session-close
B.
session-close
Answers
C.
deny
C.
deny
Answers
D.
count
D.
count
Answers
Suggested answer: B, C

Explanation:

you need to create a global firewall rulebase that matches RT_FLOW_SESSION_DENY events2.To do this, you need to specify two policy parameters:denyandsession-close3.

You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?

A.
Connect JIMS to the RADIUS server
A.
Connect JIMS to the RADIUS server
Answers
B.
Connect JIMS to the domain Exchange server
B.
Connect JIMS to the domain Exchange server
Answers
C.
Connect JIMS to the domain SQL server.
C.
Connect JIMS to the domain SQL server.
Answers
D.
Connect JIMS to another SRX Series device.
D.
Connect JIMS to another SRX Series device.
Answers
Suggested answer: D

Explanation:

JIMS serveris aJuniper Identity Management Servicethat collects user identity information from different authentication sources for SRX Series devices12.It can connect to SRX Series devices and CSO platform in your network1.

JIMS server is a service that protects corporate resources by authenticating and restricting user access based on roles2.It connects to SRX Series devices and CSO platform to provide identity information for firewall policies1.To reduce the load that JIMS server places on your network, you should connect JIMS to another SRX Series device1. This way, you can distribute the identity information among multiple SRX Series devices and reduce network traffic.

Total 98 questions
Go to page: of 10