ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP addresses? (Choose two.)

A.
Microsoft Exchange Server event logs
A.
Microsoft Exchange Server event logs
Answers
B.
DNS
B.
DNS
Answers
C.
Active Directory domain controller event logs
C.
Active Directory domain controller event logs
Answers
D.
OpenLDAP service ports
D.
OpenLDAP service ports
Answers
Suggested answer: B, C

Explanation:

Juniper Identity Management Service (JIMS) collects username and device IP addresses from both DNS and Active Directory domain controller event logs. DNS is used to resolve hostnames to IP addresses, while Active Directory domain controller event logs are used to get information about user accounts, such as when they last logged in.

You are experiencing excessive packet loss on one of your two WAN links route traffic from the degraded link to the working link

Which AppSecure component would you use to accomplish this task?

A.
AppFW
A.
AppFW
Answers
B.
AppQoE
B.
AppQoE
Answers
C.
AppQoS
C.
AppQoS
Answers
D.
APBR
D.
APBR
Answers
Suggested answer: D

Explanation:

APBR (Application Path-Based Routing) is an AppSecure component which can be used to route traffic from the degraded link to the working link in order to reduce packet loss. APBR is a policy-based routing solution that allows you to configure rules to direct traffic to the most appropriate path, based on application, user, or network metrics.

Which solution enables you to create security policies that include user and group information?

A.
JIMS
A.
JIMS
Answers
B.
ATP Appliance
B.
ATP Appliance
Answers
C.
Network Director
C.
Network Director
Answers
D.
NETCONF
D.
NETCONF
Answers
Suggested answer: A

Explanation:

The solution that enables you to create security policies that include user and group information is JIMS (Juniper Identity Management Service). JIMS collects and maintains a large database of user, device, and group information from Active Directory domains or syslog sources, and enables SRX Series devices to rapidly identify thousands of users in a large, distributed enterprise. With JIMS, you can create security policies that include user and group information, and enforce user-based access control policies to protect network resources.

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

A.
vQFX
A.
vQFX
Answers
B.
MX
B.
MX
Answers
C.
vMX
C.
vMX
Answers
D.
QFX
D.
QFX
Answers
Suggested answer: B, C

Explanation:

The MX and vMX devices can be used for DDoS protection with Policy Enforcer. Policy Enforcer is a Juniper Networks solution that provides real-time protection from DDoS attacks. It can be used to detect and block malicious traffic, and also provides granular control over user access and policy enforcement. The MX and vMX devices are well-suited for use with Policy Enforcer due to their high-performance hardware and advanced security features.

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

A.
scalability
A.
scalability
Answers
B.
no required software license
B.
no required software license
Answers
C.
granular security
C.
granular security
Answers
D.
infinite number of interfaces
D.
infinite number of interfaces
Answers
Suggested answer: A, C

Explanation:

Scalability: vSRX instances can be easily added or removed as the needs of the network change, making it a flexible option for scaling in a software-defined network.

Granular Security: vSRX allows for granular security policies to be enforced at the virtual interface level, making it an effective solution for securing traffic in a software-defined network.

The two benefits of using a vSRX in a software-defined network are scalability and granular security. Scalability allows you to increase the number of resources available to meet the demands of network traffic, while granular security provides a level of control and flexibility to your network security that is not possible with a traditional firewall. With a vSRX, you can create multiple levels of security policies, rules, and access control lists to ensure that only authorized traffic can enter and exit your network. Additionally, you would not require a software license to use the vSRX, making it an economical solution for those looking for increased security and flexibility.

Exhibit

Referring to the exhibit which statement is true?

A.
SSL proxy functions will ignore the session.
A.
SSL proxy functions will ignore the session.
Answers
B.
SSL proxy leverages post-match results.
B.
SSL proxy leverages post-match results.
Answers
C.
SSL proxy must wait for return traffic for the final match to occur.
C.
SSL proxy must wait for return traffic for the final match to occur.
Answers
D.
SSL proxy leverages pre-match result
D.
SSL proxy leverages pre-match result
Answers
Suggested answer: D

Which two statements about SRX Series device chassis clusters are true? (Choose two.)

A.
Redundancy group 0 is only active on the cluster backup node.
A.
Redundancy group 0 is only active on the cluster backup node.
Answers
B.
Each chassis cluster member requires a unique cluster ID value.
B.
Each chassis cluster member requires a unique cluster ID value.
Answers
C.
Each chassis cluster member device can host active redundancy groups
C.
Each chassis cluster member device can host active redundancy groups
Answers
D.
Chassis cluster member devices must be the same model.
D.
Chassis cluster member devices must be the same model.
Answers
Suggested answer: B, C

Explanation:

B) Each chassis cluster member requires a unique cluster ID value: This statement is true. Each chassis cluster member must have a unique cluster ID assigned, which is used to identify each device in the cluster.

C) Each chassis cluster member device can host active redundancy groups: This statement is true. Both devices in a chassis cluster can host active redundancy groups, allowing for load balancing and failover capabilities.

The two statements about SRX Series device chassis clusters that are true are that each chassis cluster member requires a unique cluster ID value, and that each chassis cluster member device can host active redundancy groups. A unique cluster ID value is necessary so that all members of the cluster can be identified, and each chassis cluster member device can host active redundancy groups to ensure that the cluster is able to maintain high availability and redundancy. Additionally, it is not necessary for all chassis cluster member devices to be the same model, as long as all devices are running the same version of Junos software.

Which two statements are correct about the cSRX? (Choose two.)

A.
The cSRX supports firewall, NAT, IPS, and UTM services.
A.
The cSRX supports firewall, NAT, IPS, and UTM services.
Answers
B.
The cSRX only supports Layer 2 'bump-in-the-wire' deployments.
B.
The cSRX only supports Layer 2 'bump-in-the-wire' deployments.
Answers
C.
The cSRX supports BGP, OSPF. and IS-IS routing services.
C.
The cSRX supports BGP, OSPF. and IS-IS routing services.
Answers
D.
The cSRX has three default zones: trust, untrust, and management
D.
The cSRX has three default zones: trust, untrust, and management
Answers
Suggested answer: A, D

Explanation:

The two statements that are correct about the cSRX are that it supports firewall, NAT, IPS, and UTM services, and that it has three default zones: trust, untrust, and management. The cSRX is a software-defined security solution that provides comprehensive network security capabilities and is designed for virtualized environments. It supports firewall, NAT, IPS, and UTM services to protect against threats, as well as BGP, OSPF, and IS-IS routing services for routing functionality. Additionally, the cSRX has three default zones: trust, untrust, and management. The trust zone is used to define traffic that is allowed to enter the network, the untrust zone is used to define traffic that should be blocked from entering the network, and the management zone is used to manage the device itself. The cSRX does not support Layer 2 'bump-in-the-wire' deployments.

What are two types of system logs that Junos generates? (Choose two.)

A.
SQL log files
A.
SQL log files
Answers
B.
data plane logs
B.
data plane logs
Answers
C.
system core dump files
C.
system core dump files
Answers
D.
control plane logs
D.
control plane logs
Answers
Suggested answer: B, D

Explanation:

The two types of system logs that Junos generates are control plane logs and data plane logs. Control plane logs are generated by the Junos operating system and contain system-level events such as system startup and shutdown, configuration changes, and system alarms. Data plane logs are generated by the network protocol processes and contain messages about the status of the network and its components, such as routing, firewall, NAT, and IPS. SQL log files and system core dump files are not types of system logs generated by Junos.

You want to set up JSA to collect network traffic flows from network devices on your network.

Which two statements are correct when performing this task? (Choose two.)

A.
BGP FlowSpec is used to collect traffic flows from Junos OS devices.
A.
BGP FlowSpec is used to collect traffic flows from Junos OS devices.
Answers
B.
Statistical sampling increases processor utilization
B.
Statistical sampling increases processor utilization
Answers
C.
Statistical sampling decreases event correlation accuracy.
C.
Statistical sampling decreases event correlation accuracy.
Answers
D.
Superflows reduce traffic licensing requirements.
D.
Superflows reduce traffic licensing requirements.
Answers
Suggested answer: A, C

Explanation:

The two correct statements when performing this task are A. BGP FlowSpec is used to collect traffic flows from Junos OS devices, and C. Statistical sampling decreases event correlation accuracy. BGP FlowSpec is a Junos OS feature that allows network devices to send traffic flow information to a Juniper security device using BGP. This allows the Juniper security device to monitor and collect the traffic flows and analyze them for suspicious activity. Statistical sampling increases processor utilization by selecting only a subset of the data to be analyzed, which can help reduce the amount of data sent to the security device. However, this also decreases the accuracy of event correlation, as some events may be missed due to the sampling. Superflows reduce traffic licensing requirements by offloading the processing of certain traffic flows to the device itself, instead of having it sent to the security device.

Total 98 questions
Go to page: of 10