ExamGecko
Home Home / Juniper / JN0-335

Juniper JN0-335 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

A.
Juniper ATP Cloud allows the creation of allowlists.
A.
Juniper ATP Cloud allows the creation of allowlists.
Answers
B.
Juniper ATP Cloud uses a single antivirus software package to analyze files.
B.
Juniper ATP Cloud uses a single antivirus software package to analyze files.
Answers
C.
Juniper ATP Cloud allows end users to bypass the inspection of files.
C.
Juniper ATP Cloud allows end users to bypass the inspection of files.
Answers
D.
Juniper ATP Cloud performs a cache lookup on files.
D.
Juniper ATP Cloud performs a cache lookup on files.
Answers
Suggested answer: A, D

Explanation:

Juniper ATP Cloud is a cloud-based service that provides advanced threat prevention and detection for your network. It integrates with SRX Series firewalls and MX Series routers to analyze files and network traffic for signs of malicious activity. Two functions that Juniper ATP Cloud performs to reduce delays in the inspection of files are:

Juniper ATP Cloud allows the creation of allowlists: Allowlists are lists of trusted files or file hashes that are excluded from scanning by Juniper ATP Cloud. You can create allowlists based on file name, file type, file size, file hash, or sender domain. By using allowlists, you can reduce the number of files that need to be uploaded to Juniper ATP Cloud for analysis and improve the performance and efficiency of your network.

Juniper ATP Cloud performs a cache lookup on files: Cache lookup is a process that checks if a file has been previously scanned by Juniper ATP Cloud and if there is a cached verdict for it. If there is a cached verdict, Juniper ATP Cloud returns it immediately without scanning the file again. If there is no cached verdict, Juniper ATP Cloud uploads the file for analysis. By using cache lookup, you can reduce the time and bandwidth required for scanning files by Juniper ATP Cloud.


You are troubleshooting unexpected issues on your JIMS server due to out of order event log timestamps.

Which action should you take to solve this issue?

A.
Enable time synchronization on the client devices.
A.
Enable time synchronization on the client devices.
Answers
B.
Enable time synchronization on the JIMS server.
B.
Enable time synchronization on the JIMS server.
Answers
C.
Enable time synchronization on the domain controllers.
C.
Enable time synchronization on the domain controllers.
Answers
D.
Enable time synchronization on the SRX Series devices.
D.
Enable time synchronization on the SRX Series devices.
Answers
Suggested answer: C

Explanation:

To solve the issue of out of order event log timestamps on your JIMS server, you should enable time synchronization on the domain controllers. JIMS (Juniper Identity Management Service) is a Windows service that collects user, device, and group information from Active Directory domains or syslog sources and provides it to SRX Series devices and CSO for identity-based security policies. JIMS relies on the timestamps of the event logs generated by the domain controllers to track user logins, logouts, and IP address changes. If the domain controllers have different or inaccurate clocks, the event logs may have out of order or incorrect timestamps, which can cause JIMS to miss or misinterpret some events and affect its accuracy and performance. Therefore, you should ensure that all the domain controllers in your network are synchronized with a reliable time source, such as an NTP server or a Windows Time service.Reference:=Juniper Identity Management Service User Guide,Juniper Identity Management Service Feature Guide,Configure JIMS Collector to Get Microsoft Event Logs,Considerations for timestamps in centralized logging platforms

Which statement defines the function of an Application Layer Gateway (ALG)?

A.
The ALG uses software processes for permitting or disallowing specific IP address ranges.
A.
The ALG uses software processes for permitting or disallowing specific IP address ranges.
Answers
B.
The ALG uses software that is used by a single TCP session using the same port numbers as the application.
B.
The ALG uses software that is used by a single TCP session using the same port numbers as the application.
Answers
C.
The ALG contains protocols that use one application session for each TCP session.
C.
The ALG contains protocols that use one application session for each TCP session.
Answers
D.
The ALG uses software processes for managing specific protocols.
D.
The ALG uses software processes for managing specific protocols.
Answers
Suggested answer: D

Explanation:

The statement that defines the function of an Application Layer Gateway (ALG) is: The ALG uses software processes for managing specific protocols. An ALG is a security component that operates at the application layer (layer 7) of the OSI model and handles data associated with certain application protocols, such as SIP, FTP, RTSP, etc. An ALG acts as a proxy or intermediary between the client and the server applications and performs various functions, such as address and port translation, resource allocation, application response control, and synchronization of data and control traffic. An ALG can also inspect and modify the application payload to enable firewall or NAT traversal, prevent spoofing or DoS attacks, or enforce granular security policies based on application-specific commands.Reference:=Application-level gateway - Wikipedia,What Is an Application Layer Gateway (ALG)? | F5,What is ALG ** Application Layer Gateway | 3CX

Which two statements are true about Juniper ATP Cloud? (Choose two.)

A.
Juniper ATP Cloud only uses one antivirus software package to analyze files.
A.
Juniper ATP Cloud only uses one antivirus software package to analyze files.
Answers
B.
Juniper ATP Cloud uses multiple antivirus software packages to analyze files.
B.
Juniper ATP Cloud uses multiple antivirus software packages to analyze files.
Answers
C.
Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.
C.
Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.
Answers
D.
Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.
D.
Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.
Answers
Suggested answer: B, D

Explanation:

Two statements that are true about Juniper ATP Cloud are:

Juniper ATP Cloud uses multiple antivirus software packages to analyze files: Juniper ATP Cloud is a cloud-based service that provides advanced threat prevention and detection for your network. It integrates with SRX Series firewalls and MX Series routers to analyze files and network traffic for signs of malicious activity. Juniper ATP Cloud uses multiple antivirus software packages from different vendors to scan files for known malware signatures and provide a comprehensive verdict based on their results.

Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats: Juniper ATP Cloud protects against zero-day threats by using dynamic analysis, not antivirus software packages. Dynamic analysis is a method of executing files in a sandbox environment and observing their behavior and network interactions. Dynamic analysis can uncover unknown malware that may evade static analysis or signature-based detection methods.

Which two statements about SRX Series device chassis clusters are correct? (Choose two.)

A.
The chassis cluster data plane is connected with revenue ports.
A.
The chassis cluster data plane is connected with revenue ports.
Answers
B.
The chassis cluster can contain a maximum of three devices.
B.
The chassis cluster can contain a maximum of three devices.
Answers
C.
The chassis cluster data plane is connected with SPC ports.
C.
The chassis cluster data plane is connected with SPC ports.
Answers
D.
The chassis cluster can contain a maximum of two devices.
D.
The chassis cluster can contain a maximum of two devices.
Answers
Suggested answer: A, D

Explanation:

Two statements that are correct about SRX Series device chassis clusters are:

The chassis cluster data plane is connected with revenue ports: A chassis cluster is a high-availability feature that groups two identical SRX Series devices into a cluster that acts as a single device. The cluster has two types of links: control links and fabric links. The control links are used for exchanging heartbeat messages and configuration synchronization between the nodes. The fabric links are used for forwarding data traffic between the nodes. The fabric links are connected with revenue ports, which are regular Ethernet interfaces that can also be used for normal traffic when not in cluster mode.

The chassis cluster can contain a maximum of two devices: A chassis cluster can only consist of two nodes: node 0 and node 1. The nodes must be the same model, have the same hardware configuration, run the same software version, and have the same license keys. The nodes share a common configuration and act as backup for each other in case of failure.

Which two statements are correct about the Junos IPS feature? (Choose two.)

A.
IPS is integrated as a security service on SRX Series devices.
A.
IPS is integrated as a security service on SRX Series devices.
Answers
B.
IPS uses sandboxinQ to detect unknown attacks.
B.
IPS uses sandboxinQ to detect unknown attacks.
Answers
C.
IPS is a standalone platform running on dedicated hardware or as a virtual device.
C.
IPS is a standalone platform running on dedicated hardware or as a virtual device.
Answers
D.
IPS uses protocol anomaly rules to detect unknown attacks.
D.
IPS uses protocol anomaly rules to detect unknown attacks.
Answers
Suggested answer: A, D

Explanation:

Junos IPS is a feature that provides intrusion prevention and detection services on SRX Series devices. It monitors network traffic and compares it against predefined signatures or custom rules to identify and block malicious or unwanted packets. Two statements that are correct about the Junos IPS feature are:

IPS is integrated as a security service on SRX Series devices: Junos IPS is not a separate platform or device, but a security service that runs on SRX Series firewalls. It can be enabled and configured as part of the security policy on the SRX Series device and applied to specific zones, interfaces, or traffic flows.

IPS uses protocol anomaly rules to detect unknown attacks: Junos IPS uses two types of rules to detect attacks: signature rules and protocol anomaly rules. Signature rules match traffic against known attack patterns or signatures and block them based on predefined actions. Protocol anomaly rules detect deviations from the expected behavior or structure of common protocols, such as TCP, UDP, ICMP, etc. Protocol anomaly rules can help identify unknown or zero-day attacks that may not have a signature yet.

How does the SSL proxy detect if encryption is being used?

A.
It uses application identity services.
A.
It uses application identity services.
Answers
B.
It verifies the length of the packet
B.
It verifies the length of the packet
Answers
C.
It queries the client device.
C.
It queries the client device.
Answers
D.
It looks at the destination port number.
D.
It looks at the destination port number.
Answers
Suggested answer: D

Explanation:

The SSL proxy can detect if encryption is being used by looking at the destination port number of the packet. If the port number is 443, then the proxy can assume that the packet is being sent over an encrypted connection. If the port number is different, then the proxy can assume that the packet is not encrypted. For more information, please refer to the Juniper Networks JNCIS-SEC Study Guide.

The SSL proxy is a security feature that provides visibility and control over SSL/TLS encrypted traffic. When SSL proxy is enabled, it intercepts SSL/TLS traffic and decrypts it to allow visibility into the content of the encrypted traffic. However, before decrypting the traffic, the SSL proxy must first determine if the traffic is encrypted.

To detect if encryption is being used, the SSL proxy looks at the destination port number. If the destination port number is a known SSL/TLS port (e.g., TCP port 443), the SSL proxy assumes that encryption is being used and intercepts the traffic. If the destination port is not a known SSL/TLS port, the SSL proxy does not intercept the traffic and allows it to pass through the device unmodified.

Which two statements are correct when considering IPS rule base evaluation? (Choose two.)

A.
IPS evaluates rules concurrently.
A.
IPS evaluates rules concurrently.
Answers
B.
IPS applies the most severe action to traffic matching multiple rules,
B.
IPS applies the most severe action to traffic matching multiple rules,
Answers
C.
IPS evaluates rules sequentially
C.
IPS evaluates rules sequentially
Answers
D.
IPS applies the least severe action to traffic matching multiple rules.
D.
IPS applies the least severe action to traffic matching multiple rules.
Answers
Suggested answer: A, B

Explanation:

The Intrusion Prevention System (IPS) is a feature that provides protection against network-based threats. The IPS uses a rule base to evaluate network traffic and apply actions based on the rules that match the traffic.

When evaluating the rule base, the IPS evaluates the rules concurrently (option A). This means that the IPS can apply multiple rules to the same traffic simultaneously.

If multiple rules match the same traffic, the IPS applies the most severe action (option B). This means that if there are conflicting actions specified in different rules, the IPS will apply the action that has the highest severity. For example, if one rule specifies a 'drop' action and another rule specifies a 'log' action for the same traffic, the IPS will drop the traffic because dropping has a higher severity than logging.

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

A.
In the vSwitch security settings, accept promiscuous mode.
A.
In the vSwitch security settings, accept promiscuous mode.
Answers
B.
In the vSwitch properties settings, set the VLAN ID to None.
B.
In the vSwitch properties settings, set the VLAN ID to None.
Answers
C.
In the vSwitch security settings, reject forged transmits.
C.
In the vSwitch security settings, reject forged transmits.
Answers
D.
In the vSwitch security settings, reject MAC address changes.
D.
In the vSwitch security settings, reject MAC address changes.
Answers
Suggested answer: C, D

Which two statements are true about the vSRX? (Choose two.)

A.
It does not have VMXNET3 vNIC support.
A.
It does not have VMXNET3 vNIC support.
Answers
B.
It has VMXNET3 vNIC support.
B.
It has VMXNET3 vNIC support.
Answers
C.
UNIX is the base OS.
C.
UNIX is the base OS.
Answers
D.
Linux is the base OS.
D.
Linux is the base OS.
Answers
Suggested answer: B, D

Explanation:

The vSRX is a virtual security appliance that runs on a virtual machine. It provides firewall, VPN, and other security services in a virtualized environment.

The vSRX is based on a version of Junos OS that is optimized for virtualization. It runs on a Linux kernel and uses a KVM hypervisor. It supports VMware ESXi and KVM hypervisors.

The vSRX has support for VMXNET3 vNICs, which are high-performance virtual network interfaces provided by VMware. These interfaces can provide higher throughput and lower CPU utilization than other virtual NIC types.

Total 98 questions
Go to page: of 10