ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.

Which Juniper Networks solution will accomplish this task?

A.
JIMS
A.
JIMS
Answers
B.
Encrypted Traffic Insights
B.
Encrypted Traffic Insights
Answers
C.
UTM
C.
UTM
Answers
D.
Adaptive Threat Profiling
D.
Adaptive Threat Profiling
Answers
Suggested answer: D

Explanation:

Adaptive Threat Profiling (ATP) is a Juniper Networks solution that enables organizations to detect malicious activity on their networks and process it through IPS and Juniper ATP Cloud for malware and virus protection. ATP is powered by Juniper's advanced Machine Learning and Artificial Intelligence (AI) capabilities, allowing it to detect and block malicious activity in real-time. ATP is integrated with Juniper's Unified Threat Management (UTM) and Encrypted Traffic Insights (ETI) solutions, providing an end-to-end network protection solution.

Exhibit

Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

A.
The session-class parameter in only used when troubleshooting.
A.
The session-class parameter in only used when troubleshooting.
Answers
B.
The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.
B.
The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.
Answers
C.
Every session that enters the SRX Series device will generate an event
C.
Every session that enters the SRX Series device will generate an event
Answers
D.
Replacing the session-init parameter with session-lose will log unidentified flows.
D.
Replacing the session-init parameter with session-lose will log unidentified flows.
Answers
Suggested answer: B, C

Explanation:

The configuration shown in the exhibit is for a Juniper SRX Series firewall. The session-init parameter is used to control how the firewall processes unknown traffic flows. With the session-init parameter set to 300, any traffic flows that the firewall does not recognize will be dropped after 300 milliseconds. Additionally, every session that enters the device, whether it is known or unknown, will generate an event, which can be used for logging and troubleshooting purposes. The session-lose parameter is used to control how the firewall handles established sessions that are terminated.

Your company is using the Juniper ATP Cloud free model. The current inspection profile is set at 10 MB You are asked to configure ATP Cloud so that executable files up to 30 MB can be scanned while at the same time minimizing the change in scan time for other file types.

Which configuration should you use in this scenario?

A.
Use the CLI to create a custom profile and increase the scan limit.
A.
Use the CLI to create a custom profile and increase the scan limit.
Answers
B.
Use the ATP Cloud Ul to change the default profile to increase the scan limit for all files to 30 MB.
B.
Use the ATP Cloud Ul to change the default profile to increase the scan limit for all files to 30 MB.
Answers
C.
Use the CLI to change the default profile to increase the scan limit for all files to 30 MB.
C.
Use the CLI to change the default profile to increase the scan limit for all files to 30 MB.
Answers
D.
Use the ATP Cloud Ul to update a custom profile and increase the scan limit for executable files to 30 MB.
D.
Use the ATP Cloud Ul to update a custom profile and increase the scan limit for executable files to 30 MB.
Answers
Suggested answer: D

Explanation:

In this scenario, you should use the ATP Cloud Ul to create a custom profile and update the scan limit for executable files to 30 MB. This will ensure that executable files up to 30 MB can be scanned, while at the same time minimizing the change in scan time for other file types. To do this, log in to the ATP Cloud Ul and go to the Profiles tab. Click the Create button to create a new profile, and then adjust the scan limits for executable files to 30 MB. Once you have saved the custom profile, you can apply it to the desired systems and the new scan limit will be in effect.

You are configuring logging for a security policy.

In this scenario, in which two situations would log entries be generated? (Choose two.)

A.
every 10 minutes
A.
every 10 minutes
Answers
B.
at session initialization
B.
at session initialization
Answers
C.
every 60 seconds
C.
every 60 seconds
Answers
D.
at session close
D.
at session close
Answers
Suggested answer: B, D

Explanation:

Log entries would be generated in two situations: at session initialization and at session close. At session initialization, the log entry would include details about the connection, such as the source and destination IP addresses, the service being used, and the action taken by the security policy. At session close, the log entry would include details about the connection, such as the duration of the session, the bytes sent/received, and the action taken by the security policy. For more information, you can refer to the Juniper Security documentation athttps://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/security-log-configuration.html.

Exhibit

When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)

A.
The SSL proxy certificate ID is part of a blocklist.
A.
The SSL proxy certificate ID is part of a blocklist.
Answers
B.
The SSL proxy certificate ID does not have the correct renegotiation option set.
B.
The SSL proxy certificate ID does not have the correct renegotiation option set.
Answers
C.
The SSL proxy certificate ID is for a forwarding proxy.
C.
The SSL proxy certificate ID is for a forwarding proxy.
Answers
D.
The SSL proxy certificate ID does not exist.
D.
The SSL proxy certificate ID does not exist.
Answers
Suggested answer: A, D

Explanation:

Two possible reasons for this error are that the SSL proxy certificate ID does not exist, or the SSL proxy certificate ID is part of a blocklist. If the SSL proxy certificate ID does not exist, you will need to generate a new certificate. If the SSL proxy certificate ID is part of a blocklist, you will need to contact the source of the blocklist to remove it. Additionally, you may need to check that the SSL proxy certificate ID has the correct renegotiation option set, as this is necessary for proper server protection. For more information, you can refer to the Juniper Security documentation athttps://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/security-ssl-proxy-configuration.html.

Which two statements are true about Juniper ATP Cloud? (Choose two.)

A.
Dynamic analysis is always performed to determine if a file contains malware.
A.
Dynamic analysis is always performed to determine if a file contains malware.
Answers
B.
If the cache lookup determines that a file contains malware, performed to verify the results.
B.
If the cache lookup determines that a file contains malware, performed to verify the results.
Answers
C.
Dynamic analysis is not always necessary to determine if a file contains malware.
C.
Dynamic analysis is not always necessary to determine if a file contains malware.
Answers
D.
If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results.
D.
If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results.
Answers
Suggested answer: C, D

Explanation:

Dynamic analysis is not always necessary to determine if a file contains malware, as the ATP Cloud uses a cache lookup to quickly identify known malicious files. If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results. This information can be found on the Juniper website here:https://www.juniper.net/documentation/en_US/release-independent/security/jnpr-security-srx-series/information-products/topic-collection/jnpr-security-srx-resources.html#id-jnpr-security-srx-resources-atp-cloud.

Which statement about security policy schedulers is correct?

A.
Multiple policies can use the same scheduler.
A.
Multiple policies can use the same scheduler.
Answers
B.
A policy can have multiple schedulers.
B.
A policy can have multiple schedulers.
Answers
C.
When the scheduler is disabled, the policy will still be available.
C.
When the scheduler is disabled, the policy will still be available.
Answers
D.
A policy without a defined scheduler will not become active
D.
A policy without a defined scheduler will not become active
Answers
Suggested answer: A

Explanation:

Schedulers can be defined and reused by multiple policies, allowing for more efficient management of policy activation and deactivation. This can be particularly useful for policies that need to be activated during specific time periods, such as business hours or maintenance windows.

You are asked to create an IPS-exempt rule base to eliminate false positives from happening.

Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)

A.
source port
A.
source port
Answers
B.
source IP address
B.
source IP address
Answers
C.
destination IP address
C.
destination IP address
Answers
D.
destination port
D.
destination port
Answers
Suggested answer: B

Explanation:

To exclude traffic from being examined by IPS, you can use the source IP address and/or destination port as criteria for the exemption. This is achieved by configuring an IPS-exempt rule base that includes specific exemption rules based on these criteria.

What are three capabilities of AppQoS? (Choose three.)

A.
re-write DSCP values
A.
re-write DSCP values
Answers
B.
assign a forwarding class
B.
assign a forwarding class
Answers
C.
re-write the TTL
C.
re-write the TTL
Answers
D.
rate-limit traffic
D.
rate-limit traffic
Answers
E.
reserve bandwidth
E.
reserve bandwidth
Answers
Suggested answer: A, B, E

Explanation:

AppQoS (Application Quality of Service) is a Junos OS feature that provides advanced control and prioritization of application traffic. With AppQoS, you can classify application traffic, assign a forwarding class to the traffic, and apply quality of service (QoS) policies to the traffic. You can also re-write DSCP values and reserve bandwidth for important applications. However, AppQoS does not re-write the TTL or rate-limit traffic.

Source: Juniper Networks, Security, Specialist (JNCIS-SEC) Study Guide. Chapter 3: AppSecure. Page 66-67.

You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows.

In this scenario, which two statements are correct? (Choose two.)

A.
The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the low-watermark value is met.
A.
The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the low-watermark value is met.
Answers
B.
The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the high-watermark value is met.
B.
The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the high-watermark value is met.
Answers
C.
The high-watermark configuration specifies the percentage of how much of the session table is left before disabling a more aggressive age- out timer.
C.
The high-watermark configuration specifies the percentage of how much of the session table is left before disabling a more aggressive age- out timer.
Answers
D.
The high-watermark configuration specifies the percentage of how much of the session table can be allocated before applying a more aggressive age-out timer
D.
The high-watermark configuration specifies the percentage of how much of the session table can be allocated before applying a more aggressive age-out timer
Answers
Suggested answer: B, D

Explanation:

The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the high-watermark value is met. The high-watermark configuration specifies the percentage of how much of the session table can be allocated before applying a more aggressive age-out timer. This ensures that the session table does not become full and cause traffic issues, and also ensures that existing flows are aged out quickly when the table begins to get close to being full.

Total 98 questions
Go to page: of 10