ExamGecko
Home Home / Juniper / JN0-636

Juniper JN0-636 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Exhibit

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

A.
This is the last packet in the session.
A.
This is the last packet in the session.
Answers
B.
The SRX Series device is performing both source and destination NAT on this session.
B.
The SRX Series device is performing both source and destination NAT on this session.
Answers
C.
This is the first packet in the session.
C.
This is the first packet in the session.
Answers
D.
The SRX Series device is performing only source NAT on this session.
D.
The SRX Series device is performing only source NAT on this session.
Answers
Suggested answer: B, C

Explanation:

The SRX Series device is performing both source and destination NAT on this session because the traceoptions output shows that both source and destination IP addresses and ports are translated.

The source IP address 192.168.5.2 is translated to 192.168.100.1 and the destination IP address 1.1.1.1 is translated to 192.168.5.1. The source port 0 is translated to 14777 and the destination port 80 is translated to 80. The traceoptions output also shows the rule and pool IDs for both source and destination NAT: 2/32770 and 1/1 respectively.

This is the first packet in the session because the traceoptions output shows the flag flow_first_packet, which indicates that this is the first packet of a new session. The traceoptions output also shows the flag flow_first_src_xlate and flow_first_rule_dst_xlate, which indicate that this is the first time that source and destination NAT are applied to this session.

Reference:

traceoptions (Security NAT) | Junos OS | Juniper Networks

[SRX] How to interpret Flow TraceOptions output for NAT troubleshooting

Exhibit

Which two statements are correct about the output shown in the exhibit. (Choose two.)

A.
The source address is translated.
A.
The source address is translated.
Answers
B.
The packet is an SSH packet
B.
The packet is an SSH packet
Answers
C.
The packet matches a user-configured policy
C.
The packet matches a user-configured policy
Answers
D.
The destination address is translated.
D.
The destination address is translated.
Answers
Suggested answer: A, B

Explanation:

The source address is translated because the traceoptions output shows that the source IP address 192.168.5.2 is translated to 192.168.100.1 and the source port 0 is translated to 14777. The traceoptions output also shows the flag flow_first_src_xlate, which indicates that this is the first time that source NAT is applied to this session.

The packet is an SSH packet because the traceoptions output shows that the application protocol is tcp/22, which is the default port for SSH. The traceoptions output also shows the flag flow_tcp_syn, which indicates that this is the first packet of a TCP connection.

Reference:

traceoptions (Security NAT) | Junos OS | Juniper Networks

[SRX] How to interpret Flow TraceOptions output for NAT troubleshooting

Which statement is true about persistent NAT types?

A.
The target-host-port parameter cannot be used with IPv4 addresses in NAT46.
A.
The target-host-port parameter cannot be used with IPv4 addresses in NAT46.
Answers
B.
The target-host parameter cannot be used with IPv6 addressee in NAT64.
B.
The target-host parameter cannot be used with IPv6 addressee in NAT64.
Answers
C.
The target-host parameter cannot be used with IPv4 addresses in NAT46
C.
The target-host parameter cannot be used with IPv4 addresses in NAT46
Answers
D.
The target-host-port parameter cannot be used with IPv6 addresses in NAT64
D.
The target-host-port parameter cannot be used with IPv6 addresses in NAT64
Answers
Suggested answer: D

Explanation:

NAT (Network Address Translation) is a method to map one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. There are different types of NAT, one of them is the persistent NAT which is a type of NAT that allows you to map the same internal IP address to the same external IP address each time a host initiates a connection.

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

A.
VRF instances
A.
VRF instances
Answers
B.
virtual router instances
B.
virtual router instances
Answers
C.
logical systems
C.
logical systems
Answers
D.
tenant systems
D.
tenant systems
Answers
Suggested answer: C

Explanation:

A logical system is a virtualization feature in SRX Series devices that allows you to create multiple, isolated virtual routers within a single physical device. Each logical system has its own routing table, firewall policies, and interfaces, and it can be managed and configured independently of the other logical systems. Logical systems are an effective way to isolate different administrative domains and to support a large number of virtualized instances.

According to the Juniper documentation, the solution that would best meet the requirements of deploying a virtualization solution with the security devices in the network is logical systems. Logical systems are a feature that allows the SRX Series device to be partitioned into multiple logical devices, each with its own discrete administrative domain, routing table, firewall policies, VPNs, and interfaces1. Each logical system can support up to 100 virtualized instances, depending on the SRX Series model and the available resources2.

The following solutions are not suitable or incorrect for this scenario:

VRF instances: VRF instances are a type of routing instance that allows the SRX Series device to maintain multiple routing tables for different VPNs or customers. However, VRF instances do not provide separate administrative domains, firewall policies, or interfaces for each instance3.

Virtual router instances: Virtual router instances are a type of routing instance that allows the SRX Series device to create multiple logical routers, each with its own routing table and interfaces.

However, virtual router instances do not provide separate administrative domains or firewall policies for each instance.

Tenant systems: Tenant systems are a feature that allows the SRX Series device to create multiple logical devices, each with its own discrete administrative domain, routing table, firewall policies, VPNs, and interfaces. However, tenant systems are only supported on the SRX1500, SRX4100, and SRX4200 devices, and each tenant system can only support up to 10 virtualized instances.

Reference: 1: Understanding Logical Systems 2: SRX Series Logical Systems Feature Guide 3: vrf (Routing Instances) : [virtual-router (Routing Instances)] : [Understanding Tenant Systems]

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.
The packet is processed as host inbound traffic.
A.
The packet is processed as host inbound traffic.
Answers
B.
The packet matches the default security policy.
B.
The packet matches the default security policy.
Answers
C.
The packet matches a configured security policy.
C.
The packet matches a configured security policy.
Answers
D.
The packet is processed in the first path packet flow.
D.
The packet is processed in the first path packet flow.
Answers
Suggested answer: A, D

Explanation:

The packet is processed as host inbound traffic because the traceoptions output shows that the destination IP address 10.10.10.1 belongs to the SRX device itself, which is configured with the ge-0/0/1.0 interface. The traceoptions output also shows the flag flow_host_inbound, which indicates that the packet is destined to the device.

The packet matches the default security policy because the traceoptions output shows that the policy name is default-deny, which is the implicit system-default security policy that denies all packets. The traceoptions output also shows the flag flow_policy_deny, which indicates that the packet is denied by the policy.

Reference:

traceoptions (Security NAT) | Junos OS | Juniper Networks

[SRX] How to interpret Flow TraceOptions output for NAT troubleshooting Default Security Policies | Junos OS | Juniper Networks

Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds.

Which two Juniper devices work in this situation? (Choose two)

A.
EX Series devices
A.
EX Series devices
Answers
B.
MX Series devices
B.
MX Series devices
Answers
C.
SRX Series devices
C.
SRX Series devices
Answers
D.
QFX Series devices
D.
QFX Series devices
Answers
Suggested answer: B, C

Explanation:

Juniper MX and SRX series devices support the integration of Seclntel feeds, which provide information about known command and control servers, for the purpose of blocking access to them.

These devices can be configured to use the Seclntel feeds without the need for Security Director to manage the feeds.

EX series and QFX series devices are not capable of working in this situation, as they do not support the integration of Seclntel feeds.

According to the Juniper documentation, the two Juniper devices that work in this situation are MX Series devices and SRX Series devices. These devices can use the Juniper SecIntel feeds to block access to known command and control servers without using Security Director to manage the feeds.

The Juniper SecIntel feeds are curated and verified threat intelligence data that are continuously collected from Juniper ATP Cloud, Juniper Threat Labs, and other sources. The SecIntel feeds include command and control IPs, URLs, certificate hashes, and domains that are used by attackers to control malware or maintain their connection to the network1.

The MX Series devices and the SRX Series devices can subscribe to the SecIntel feeds by using the following steps:

Configure the SecIntel service on the device by specifying the SecIntel URL, the SecIntel policy, and the SecIntel license2.

Configure the SecIntel policy on the device by specifying the SecIntel feeds, the SecIntel actions, and the SecIntel logging3.

Apply the SecIntel policy to the security zones or the firewall policies on the device by using the secintel-policy option4.

Once the SecIntel service is configured and applied, the MX Series devices and the SRX Series devices will receive the SecIntel feeds from Juniper ATP Cloud and use them to block the traffic from or to the command and control servers. The SecIntel service will also send the SecIntel logs to Juniper ATP Cloud or a third-party SIEM solution for further analysis and reporting.

The following devices are not suitable or incorrect for this situation:

EX Series devices: EX Series devices are Ethernet switches that can integrate with SecIntel to block infected hosts at the switch port. However, they cannot use the SecIntel feeds to block command and control servers, as they do not support the SecIntel service or policy.

QFX Series devices: QFX Series devices are Ethernet switches that can integrate with SecIntel to block infected hosts at the switch port. However, they cannot use the SecIntel feeds to block command and control servers, as they do not support the SecIntel service or policy.

Reference: 1: SecIntel Threat Intelligence 2: Configuring SecIntel Service 3: Configuring SecIntel

Policy 4: Applying SecIntel Policy : [SecIntel Logging] : [SecIntel Integration with EX Series Switches] :

[SecIntel Integration with QFX Series Switches]

To analyze and detect malware, Juniper ATP Cloud performs which two functions? (Choose two.)

A.
cache lookup: to see if the file is seen already and known to be malicious
A.
cache lookup: to see if the file is seen already and known to be malicious
Answers
B.
antivirus scan: with a single vendor solution to see if the file contains any potential threats
B.
antivirus scan: with a single vendor solution to see if the file contains any potential threats
Answers
C.
dynamic analysis: to see what happens if you execute the file in a real environment
C.
dynamic analysis: to see what happens if you execute the file in a real environment
Answers
D.
static analysis: to see what happens if you execute the file in a real environment
D.
static analysis: to see what happens if you execute the file in a real environment
Answers
Suggested answer: A, C

Explanation:

Juniper ATP Cloud performs cache lookup to see if the file is seen already and known to be malicious and dynamic analysis to see what happens if you execute the file in a real environment.

Cache lookup is one of the functions that Juniper ATP Cloud performs to analyze and detect malware.

Cache lookup is the first step in the pipeline approach that Juniper ATP Cloud uses to examine files.

Cache lookup checks whether the file has been seen before and whether it has a stored verdict in the database. If the file is known to be malicious, the verdict is returned to the SRX Series Firewall and the file is dropped. If the file is not found in the cache, the analysis continues with the other techniques1.

Dynamic analysis is another function that Juniper ATP Cloud performs to analyze and detect malware. Dynamic analysis runs the file in a sandbox environment and observes its behavior and actions. Dynamic analysis can reveal the hidden or obfuscated functionality of malware, such as network connections, file modifications, registry changes, and process injections. Dynamic analysis can also detect zero-day threats and evasive malware that try to avoid static analysis1.

Reference:

How is Malware Analyzed and Detected? | ATP Cloud | Juniper Networks

Exhibit

You are validating bidirectional traffic flows through your IPsec tunnel. The 4546 session represents traffic being sourced from the remote end of the IPsec tunnel. The 4547 session represents traffic that is sourced from the local network destined to the remote network.

Which statement is correct regarding the output shown in the exhibit?

A.
The remote gateway address for the IPsec tunnel is 10.20.20.2
A.
The remote gateway address for the IPsec tunnel is 10.20.20.2
Answers
B.
The session information indicates that the IPsec tunnel has not been established
B.
The session information indicates that the IPsec tunnel has not been established
Answers
C.
The local gateway address for the IPsec tunnel is 10.20.20.2
C.
The local gateway address for the IPsec tunnel is 10.20.20.2
Answers
D.
NAT is being used to change the source address of outgoing packets
D.
NAT is being used to change the source address of outgoing packets
Answers
Suggested answer: C

Explanation:

According to the output shown in the exhibit, which is a security flow session on an SRX Series device, the correct statement is that the local gateway address for the IPsec tunnel is 10.20.20.2. This is indicated by the line In: 10.20.20.2/2060 -> 10.20.20.1/3382, which shows that the source IP address of the incoming packet is 10.20.20.2, which is the local gateway address of the IPsec tunnel.

The destination IP address of the incoming packet is 10.20.20.1, which is the remote gateway address of the IPsec tunnel.

The following statements are incorrect or not supported by the output:

The remote gateway address for the IPsec tunnel is 10.20.20.2. This is false, as explained above. The remote gateway address for the IPsec tunnel is 10.20.20.1, not 10.20.20.2.

The session information indicates that the IPsec tunnel has not been established. This is false, as the output shows that there are two active sessions with the communication tag IPSec VPN: vpn1, which indicates that the IPsec tunnel has been established and is named vpn11.

NAT is being used to change the source address of outgoing packets. This is not supported by the output, as there is no indication of NAT being applied to the outgoing packets. The source IP address of the outgoing packet is 192.168.1.1, which is the same as the source IP address of the original packet. If NAT was being used, the source IP address of the outgoing packet would be different from the source IP address of the original packet.

Reference: 1: show security flow session - Technical Documentation - Support - Juniper Networks

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.
The packet is silently discarded.
A.
The packet is silently discarded.
Answers
B.
The packet is part of an existing session.
B.
The packet is part of an existing session.
Answers
C.
The packet is part of a new session.
C.
The packet is part of a new session.
Answers
D.
The packet is explicitly rejected.
D.
The packet is explicitly rejected.
Answers
Suggested answer: A, C

Explanation:

The packet is silently discarded because the traceoptions output shows that the packet is dropped with the flag flow_spu_drop, which indicates that the packet is dropped by the SPU without sending any response to the sender. The traceoptions output also shows the reason for the drop as "no session found, start first path. in_tunnel - 0, from_cp_flag - 0" which means that the packet does not match any existing session and is not part of a tunnel or a control plane traffic1.

The packet is part of a new session because the traceoptions output shows that the packet is the first packet of a TCP connection with the flag flow_tcp_syn, which indicates that the packet has the SYN flag set. The traceoptions output also shows that the packet is processed in the first path packet flow with the message "no session found, start first path" which means that the packet is initiating a new session1.

Reference:

traceoptions (Security Flow) | Junos OS | Juniper Networks

[SRX] How to interpret Flow TraceOptions output for NAT troubleshooting

You are asked to provide single sign-on (SSO) to Juniper ATP Cloud. Which two steps accomplish this goal? (Choose two.)

A.
Configure Microsoft Azure as the service provider (SP).
A.
Configure Microsoft Azure as the service provider (SP).
Answers
B.
Configure Microsoft Azure as the identity provider (IdP).
B.
Configure Microsoft Azure as the identity provider (IdP).
Answers
C.
Configure Juniper ATP Cloud as the service provider (SP).
C.
Configure Juniper ATP Cloud as the service provider (SP).
Answers
D.
Configure Juniper ATP Cloud as the identity provider (IdP).
D.
Configure Juniper ATP Cloud as the identity provider (IdP).
Answers
Suggested answer: B, C

Explanation:

To provide single sign-on (SSO) to Juniper ATP Cloud, you need to configure the following:

Microsoft Azure as the identity provider (IdP): This allows users to authenticate to Juniper ATP Cloud using their Azure credentials.

Juniper ATP Cloud as the service provider (SP): This allows Juniper ATP Cloud to accept the authentication from Microsoft Azure and provide SSO access to the users.

Configuring Microsoft Azure as the service provider (SP) and Juniper ATP Cloud as the identity provider (IdP) are not the correct steps to provide SSO, as the roles are reversed.

Total 115 questions
Go to page: of 12