ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Exhibit

Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?

A.
Forwarding Lookup
A.
Forwarding Lookup
Answers
B.
Services ALGs
B.
Services ALGs
Answers
C.
Security Policy
C.
Security Policy
Answers
D.
Screens
D.
Screens
Answers
Suggested answer: B

You want to deploy a virtualized SRX in your environment.

In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)

A.
The vSRX supports Layer 2 and Layer 3 configurations.
A.
The vSRX supports Layer 2 and Layer 3 configurations.
Answers
B.
Only the vSRX provides clustering.
B.
Only the vSRX provides clustering.
Answers
C.
The vSRX has faster boot times.
C.
The vSRX has faster boot times.
Answers
D.
Only the vSRX provides NAT, IPS, and UTM services
D.
Only the vSRX provides NAT, IPS, and UTM services
Answers
Suggested answer: A, C

Explanation:

The vSRX supports both Layer 2 and Layer 3 configurations, while the cSRX is limited to Layer 3 configurations. Additionally, the vSRX has faster boot times, which is advantageous in certain scenarios. The vSRX and cSRX both provide NAT, IPS, and UTM services.

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.
Nancy logged in to the juniper.net Active Directory domain.
A.
Nancy logged in to the juniper.net Active Directory domain.
Answers
B.
The IP address of Nancy's client PC is 172.25.11.
B.
The IP address of Nancy's client PC is 172.25.11.
Answers
C.
The IP address of the authenticating domain controller is 172.25.11.140.
C.
The IP address of the authenticating domain controller is 172.25.11.140.
Answers
D.
Nancy is a member of the Active Directory sales group.
D.
Nancy is a member of the Active Directory sales group.
Answers
Suggested answer: C

Which method does the loT Security feature use to identify traffic sourced from IoT devices?

A.
The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud Juniper ATP Cloud.
A.
The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud Juniper ATP Cloud.
Answers
B.
The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.
B.
The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.
Answers
C.
The SRX Series device identifies loT devices using their MAC address.
C.
The SRX Series device identifies loT devices using their MAC address.
Answers
D.
The SRX Series device identifies loT devices from metadata extracted from their transit traffic.
D.
The SRX Series device identifies loT devices from metadata extracted from their transit traffic.
Answers
Suggested answer: D

Explanation:

The metadata is used to identify the type of device, its associated activities and its threat profile. This information is used to determine the appropriate security policy for the device. For more information on loT Security, please refer to the Juniper Security, Specialist (JNCIS-SEC) study guide.

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)

A.
The fab link does not support fragmentation.
A.
The fab link does not support fragmentation.
Answers
B.
The physical interface for the fab link must be specified in the configuration.
B.
The physical interface for the fab link must be specified in the configuration.
Answers
C.
The fab link supports traditional interface features.
C.
The fab link supports traditional interface features.
Answers
D.
The Junos OS supports only one fab link.
D.
The Junos OS supports only one fab link.
Answers
Suggested answer: B, C

Explanation:

The physical interface for the fab link must be specified in the configuration. Additionally, the fab link supports traditional interface features such as MAC learning, security policy enforcement, and dynamic routing protocols. The fab link does not support fragmentation and the Junos OS supports up to two fab links.

After JSA receives external events and flows, which two steps occur? (Choose two.)

A.
After formatting the data, the data is stored in an asset database.
A.
After formatting the data, the data is stored in an asset database.
Answers
B.
Before formatting the data, the data is analyzed for relevant information.
B.
Before formatting the data, the data is analyzed for relevant information.
Answers
C.
Before the information is filtered, the information is formatted
C.
Before the information is filtered, the information is formatted
Answers
D.
After the information is filtered, JSA responds with active measures
D.
After the information is filtered, JSA responds with active measures
Answers
Suggested answer: B, C

Explanation:

Before formatting the data, the data is analyzed for relevant information. This is done to filter out any irrelevant data and to extract any useful information from the data. After the information is filtered, it is then formatted so that it can be stored in an asset database. After the data has been formatted, JSA will then respond with active measures.

Which two statements are correct about SSL proxy server protection? (Choose two.)

A.
You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.
A.
You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.
Answers
B.
You must load the server certificates on the SRX Series device.
B.
You must load the server certificates on the SRX Series device.
Answers
C.
The servers must be configured to use the SSL proxy function on the SRX Series device.
C.
The servers must be configured to use the SSL proxy function on the SRX Series device.
Answers
D.
You must import the root CA on the servers.
D.
You must import the root CA on the servers.
Answers
Suggested answer: B, C

Explanation:

You must load the server certificates on the SRX Series device and configure the servers to use the SSL proxy function on the SRX Series device. This is done to ensure that the SSL proxy is able to decrypt the traffic between the client and server. Additionally, you must import the root CA on the servers in order for the SSL proxy to properly validate the server certificate.

Which two statements are correct about chassis clustering? (Choose two.)

A.
The node ID value ranges from 1 to 255.
A.
The node ID value ranges from 1 to 255.
Answers
B.
The node ID is used to identify each device in the chassis cluster.
B.
The node ID is used to identify each device in the chassis cluster.
Answers
C.
A system reboot is required to activate changes to the cluster.
C.
A system reboot is required to activate changes to the cluster.
Answers
D.
The cluster ID is used to identify each device in the chassis cluster.
D.
The cluster ID is used to identify each device in the chassis cluster.
Answers
Suggested answer: A, B

Explanation:

The node ID value ranges from 1 to 255 and is used to identify each device in the chassis cluster. The cluster ID is also used to identify each device, but it is not part of the node ID configuration. A system reboot is not required to activate changes to the cluster, but it is recommended to ensure that all changes are applied properly.

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

A.
AppTrack
A.
AppTrack
Answers
B.
AppQoS
B.
AppQoS
Answers
C.
AppFW
C.
AppFW
Answers
D.
APPID
D.
APPID
Answers
Suggested answer: C

Explanation:

The AppFW module in the AppSecure suite provides IPS signatures that can be used to monitor traffic and detect malicious activities. AppFW also provides other security controls such as Web application firewall, URL filtering, and application-level visibility.

Which two statements are correct about JSA data collection? (Choose two.)

A.
The Event Collector collects information using BGP FlowSpec.
A.
The Event Collector collects information using BGP FlowSpec.
Answers
B.
The Flow Collector can use statistical sampling
B.
The Flow Collector can use statistical sampling
Answers
C.
The Flow Collector parses logs.
C.
The Flow Collector parses logs.
Answers
D.
The Event Collector parses logs
D.
The Event Collector parses logs
Answers
Suggested answer: B, D

Explanation:

The Flow Collector can use statistical sampling to collect and store network flow data in the JSA database. The Event Collector collects information from various sources including syslog, SNMP, NetFlow, and BGP FlowSpec. Both the Flow Collector and the Event Collector parse logs to extract useful information from the logs.

Total 98 questions
Go to page: of 10