ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 8

Question list
Search
Search

What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?

A.
certificates
A.
certificates
Answers
B.
dynamic address groups
B.
dynamic address groups
Answers
C.
MAC addresses
C.
MAC addresses
Answers
D.
domain names
D.
domain names
Answers
Suggested answer: D

Explanation:

Encrypted traffic insights (ETI) uses domain names to notify SRX Series devices about known malware sites. ETI is a feature of the SRX Series firewall that can detect and block malware that is hidden in encrypted traffic. It works by analyzing the domain names of the websites that the encrypted traffic is attempting to access. If the domain name matches a known malware site, ETI will send an alert to the SRX Series device, which can then take appropriate action to block the traffic. ETI is a useful tool for protecting against threats that attempt to evade detection by hiding in encrypted traffic.

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: C

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

A.
Web proxy
A.
Web proxy
Answers
B.
client-protection
B.
client-protection
Answers
C.
server-protection
C.
server-protection
Answers
D.
DNS proxy
D.
DNS proxy
Answers
Suggested answer: B, C

Explanation:

Based on SSL proxy is a feature that allows SRX Series devices to decrypt and inspect SSL/TLS traffic for security purposes. According to SRX Series devices support two types of SSL proxy:

Client-protection SSL proxy also known as forward proxy --- The SRX Series device resides between the internal client and outside server. It decrypts and inspects traffic from internal users to the web.

Server-protection SSL proxy also known as reverse proxy --- The SRX Series device resides between outside clients and internal servers. It decrypts and inspects traffic from web users to internal servers.

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

A.
Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.
A.
Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.
Answers
B.
Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.
B.
Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.
Answers
C.
Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.
C.
Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.
Answers
D.
Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.
D.
Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.
Answers
Suggested answer: C

Explanation:

The exhibit shows a configuration snippet for security intelligence on an SRX Series device. Security intelligence is a feature that allows you to block or monitor traffic from malicious sources based on threat intelligence feeds from Juniper ATP Cloud or other providers. The configuration defines a profile for ATP Infected-Hosts, which is a feed that contains IP addresses of hosts that are infected with malware and communicate with command-and-control servers. The configuration also defines a rule for threat level 8, which is a parameter that indicates the severity of the threat. Based on this configuration, the SRX Series device will do the following:

Packets from the infected hosts with a threat level of 8 or above will be dropped: The action block-and-drop under the rule means that the device will block any traffic from the infected hosts that have a threat level equal to or higher than 8. This will prevent the hosts from sending or receiving malicious commands or data.

No log message will be generated: The absence of any log option under the rule means that the device will not generate any log message for the blocked traffic. This may reduce the load on the device and the logging server, but it may also limit the visibility and analysis of the security events.

Which two statements are correct about a reth LAG? (Choose two.)

A.
Links must have the same speed and duplex setting.
A.
Links must have the same speed and duplex setting.
Answers
B.
Links must use the same cable type
B.
Links must use the same cable type
Answers
C.
You must have a 'minimum-links' statement value of two.
C.
You must have a 'minimum-links' statement value of two.
Answers
D.
You should have two or more interfaces.
D.
You should have two or more interfaces.
Answers
Suggested answer: A, D

Explanation:

A reth LAG is a redundant Ethernet link aggregation group that combines multiple physical interfaces into a single logical interface in a chassis cluster. A reth LAG provides load balancing and redundancy for traffic within or between redundancy groups. Two statements that are correct about a reth LAG are:

Links must have the same speed and duplex setting: To form a reth LAG, the physical interfaces must have the same speed and duplex setting. This ensures that the links can operate at the same capacity and avoid performance issues or errors.

You should have two or more interfaces: To create a reth LAG, you need to have at least two physical interfaces. One interface should be connected to node 0 and the other interface should be connected to node 1. You can also have more than two interfaces in a reth LAG for increased bandwidth and redundancy.

Which two statements are true about application identification? (Choose two.)

A.
Application identification can identity nested applications that are within Layer 7.
A.
Application identification can identity nested applications that are within Layer 7.
Answers
B.
Application identification cannot identify nested applications that are within Layer 7.
B.
Application identification cannot identify nested applications that are within Layer 7.
Answers
C.
Application signatures are the same as IDP signatures.
C.
Application signatures are the same as IDP signatures.
Answers
D.
Application signatures are not the same as IDP signatures.
D.
Application signatures are not the same as IDP signatures.
Answers
Suggested answer: A, D

Explanation:

Application identification is a feature that enables SRX Series devices to identify and classify network traffic based on application signatures or custom rules. Application identification can enhance security, visibility, and control over network applications. Two statements that are true about application identification are:

Application identification can identify nested applications that are within Layer 7: Nested applications are applications that run within another application protocol, such as HTTP or SSL. For example, Facebook or YouTube are nested applications within HTTP. Application identification can identify nested applications by inspecting the application payload and matching it against predefined or custom signatures.

Application signatures are not the same as IDP signatures: Application signatures are patterns of bytes or strings that uniquely identify an application protocol or a nested application. IDP signatures are patterns of bytes or strings that indicate an attack or an exploit against a vulnerability. Application signatures are used for application identification and classification, while IDP signatures are used for intrusion detection and prevention.

Which sequence does an SRX Series device use when implementing stateful session security policies using Layer 3 routes?

A.
An SRX Series device will perform a security policy search before conducting a longest-match Layer 3 route table lookup.
A.
An SRX Series device will perform a security policy search before conducting a longest-match Layer 3 route table lookup.
Answers
B.
An SRX Series device performs a security policy search before implementing an ALG security check on the longest-match Layer 3 route.
B.
An SRX Series device performs a security policy search before implementing an ALG security check on the longest-match Layer 3 route.
Answers
C.
An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search.
C.
An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search.
Answers
D.
An SRX Series device conducts an ALG security check on the longest-match route before performing a security policy search.
D.
An SRX Series device conducts an ALG security check on the longest-match route before performing a security policy search.
Answers
Suggested answer: C

Explanation:

The sequence that an SRX Series device uses when implementing stateful session security policies using Layer 3 routes is:

An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search: When an SRX Series device receives a packet, it first looks up the destination IP address in the routing table and finds the longest matching route to forward the packet. Then, it performs a security policy search based on the source zone, destination zone, source address, destination address, protocol, and application of the packet. If there is a matching policy that allows the packet, it creates or updates a session entry for the packet and applies any security services configured in the policy.

You want to show tabular data for operational mode commands.

In this scenario, which logging parameter will provide this function?

A.
permit
A.
permit
Answers
B.
count
B.
count
Answers
C.
session-init
C.
session-init
Answers
D.
session-close
D.
session-close
Answers
Suggested answer: B

Explanation:

The logging parameter that will provide the function of showing tabular data for operational mode commands is count. The count parameter displays the number of packets and bytes that match a security policy and the action taken by the policy. The count parameter can be used with the show security policies hit-count command to display the policy counters in a tabular format. The count parameter can also be used with the show security flow session command to display the session counters in a tabular format.Reference:=show security policies hit-count,show security flow session

You need to deploy an SRX Series device in your virtual environment.

In this scenario, what are two benefits of using a CSRX? (Choose two.)

A.
The cSRX supports Layer 2 and Layer 3 deployments.
A.
The cSRX supports Layer 2 and Layer 3 deployments.
Answers
B.
The cSRX default configuration contains three default zones: trust, untrust, and management.
B.
The cSRX default configuration contains three default zones: trust, untrust, and management.
Answers
C.
The cSRX supports firewall, NAT, IPS, and UTM services.
C.
The cSRX supports firewall, NAT, IPS, and UTM services.
Answers
D.
The cSRX has low memory requirements.
D.
The cSRX has low memory requirements.
Answers
Suggested answer: C, D

Explanation:

Two benefits of using a cSRX in your virtual environment are:

The cSRX supports firewall, NAT, IPS, and UTM services: The cSRX is a containerized version of the SRX Series firewall that runs as a Docker container on Linux hosts. It provides the same features and functionality as the SRX Series physical firewalls, such as firewall, NAT, IPS, and UTM services. The cSRX can protect your virtual workloads and applications from various threats and attacks.

The cSRX has low memory requirements: The cSRX is designed to be lightweight and efficient, with low memory and CPU requirements. The cSRX can run on as little as 1 GB of RAM and 1 vCPU, making it suitable for resource-constrained environments.

You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.

Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?

A.
AppFW
A.
AppFW
Answers
B.
SIP ALG
B.
SIP ALG
Answers
C.
AppQoE
C.
AppQoE
Answers
D.
AppQoS
D.
AppQoS
Answers
Suggested answer: D

Explanation:

The service that you would implement at your edge device to prioritize VoIP traffic in this scenario is AppQoS. AppQoS is a feature that enables you to allocate bandwidth and prioritize traffic based on application signatures or custom rules. AppQoS can enhance the quality of service and experience for critical or latency-sensitive applications, such as VoIP. You can configure AppQoS policies to assign different classes of service (CoS) values or queue numbers to different applications or traffic flows. You can also define bandwidth limits, guarantees, or bursts for each class or queue.Reference:= [Application Quality of Service Overview], [Configuring Application Quality of Service]

Total 98 questions
Go to page: of 10