ExamGecko
Home Home / Juniper / JN0-636

Juniper JN0-636 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

A.
A maximum of 32 tenant systems can be configured on a physical SRX device.
A.
A maximum of 32 tenant systems can be configured on a physical SRX device.
Answers
B.
All tenant systems share a single routing protocol process.
B.
All tenant systems share a single routing protocol process.
Answers
C.
Each tenant system runs its own instance of the routing protocol process
C.
Each tenant system runs its own instance of the routing protocol process
Answers
D.
A maximum of 500 tenant systems can be configured on a physical SRX device.
D.
A maximum of 500 tenant systems can be configured on a physical SRX device.
Answers
Suggested answer: C, D

Explanation:

The following statements are true regarding tenant systems on SRX Series devices:

Each tenant system runs its own instance of the routing protocol process. Each tenant system is isolated, and it has its own routing table, interfaces, and security policies.

A maximum of 500 tenant systems can be configured on a physical SRX device. This allows for a high degree of flexibility and scalability, as each tenant system can be configured with its own set of features and security policies.

A maximum of 32 tenant systems can be configured on a physical SRX device and All tenant systems share a single routing protocol process are not correct statements

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

A.
The NAT resources must be defined in the security profile for the interconnect logical system.
A.
The NAT resources must be defined in the security profile for the interconnect logical system.
Answers
B.
No resources are needed to be allocated to the interconnect logical system.
B.
No resources are needed to be allocated to the interconnect logical system.
Answers
C.
The resources must be calculated based on the amount of traffic that will flow between the logical systems.
C.
The resources must be calculated based on the amount of traffic that will flow between the logical systems.
Answers
D.
The flow-session resource must be defined in the security profile for the interconnect logical system.
D.
The flow-session resource must be defined in the security profile for the interconnect logical system.
Answers
Suggested answer: D

Explanation:

The flow-session resource is needed in order to ensure adequate and secure communication between the two logical systems.

The flow-session resource must be defined in the security profile for the interconnect logical system because the interconnect logical system is responsible for forwarding traffic between other logical systems. The flow-session resource determines the maximum number of sessions that the interconnect logical system can create and maintain. If the flow-session resource is not allocated or is insufficient, the interconnect logical system might drop packets or fail to establish sessions1.

The NAT resources are not needed to be allocated to the interconnect logical system because the interconnect logical system does not perform any NAT operations on the traffic. The NAT resources are only relevant for the logical systems that need to translate the source or destination IP addresses or ports of the traffic1.

No resources are not needed to be allocated to the interconnect logical system is incorrect because the interconnect logical system still requires some resources to function properly, such as the flowsession resource. The interconnect logical system cannot operate without any resources allocated to it1.

The resources must be calculated based on the amount of traffic that will flow between the logical systems is partially correct, but not the best answer. The resources must be calculated based on the amount of traffic and the type of traffic that will flow between the logical systems. For example, the flow-session resource depends on the number and duration of sessions, the security-log-streamnumber resource depends on the number and size of logs, and the NAT resource depends on the number and type of NAT rules1.

Reference:

Security Profiles for Logical Systems | Junos OS | Juniper Networks

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

A.
This packet arrived on interface ge-0/0/4.0.
A.
This packet arrived on interface ge-0/0/4.0.
Answers
B.
Destination NAT occurs.
B.
Destination NAT occurs.
Answers
C.
The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.
C.
The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.
Answers
D.
An existing session is found in the table.
D.
An existing session is found in the table.
Answers
Suggested answer: A, D

Explanation:

According to the security flow trace shown in the exhibit, which is a snippet of a packet capture on an SRX Series device, the two statements that are correct are:

This packet arrived on interface ge-0/0/4.0. This is indicated by the line In: 10.0.1.129/22 -> 10.0.1.129/3382;1,0x0, which shows that the ingress interface of the packet is ge-0/0/4.0, as the interface name is prefixed to the source and destination IP addresses and ports of the packet1.

An existing session is found in the table. This is indicated by the line Found: session id 0x12. sess tok 28685, which shows that the packet matches an existing session in the session table with the session ID 0x12 and the session token 286852.

The following statements are incorrect or not supported by the output:

Destination NAT occurs. This is not supported by the output, as there is no indication of destination NAT being applied to the packet. The destination IP address of the packet is 10.0.1.129, which is the same as the destination IP address of the original packet. If destination NAT was applied, the destination IP address of the packet would be different from the destination IP address of the original packet.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129. This is false, as the output shows that the source address of the packet is 10.0.1.129, not 172.20.101.10. The source IP address of the packet is prefixed to the ingress interface name ge-0/0/4.0.

Reference: 1: Understanding Security Flow Trace 2: show security flow session - Technical Documentation - Support - Juniper Networks

Exhibit

Your company recently acquired a competitor. You want to use using the same IPv4 address space as your company.

Referring to the exhibit, which two actions solve this problem? (Choose two)

A.
Configure static NAT on the SRX Series devices.
A.
Configure static NAT on the SRX Series devices.
Answers
B.
Connect the competitor network using IPsec policy-based VPNs.
B.
Connect the competitor network using IPsec policy-based VPNs.
Answers
C.
Identify two neutral IPv4 address spaces for address translation.
C.
Identify two neutral IPv4 address spaces for address translation.
Answers
D.
Configure IPsec Transport mode.
D.
Configure IPsec Transport mode.
Answers
Suggested answer: A, C

Explanation:

To solve the problem of using the same IPv4 address space as your company, you can identify two neutral IPv4 address spaces for address translation. This will allow you to use the same IPv4 address space as your company without any conflicts. Additionally, you can configure static NAT on the SRX Series devices to ensure that the traffic is properly routed between the two networks.

Static NAT is a type of network address translation that maps a private IP address to a public IP address on a one-to-one basis. Static NAT is useful when you need to expose a server or device with a private IP address to the Internet or another network with a different IP address range. Static NAT also preserves the original source or destination IP address in the packet header, which can be useful for logging or auditing purposes1.

Neutral IPv4 address spaces are IP address ranges that are not assigned to any specific organization or entity. They are usually reserved for special purposes, such as private networks, multicast, loopback, or documentation. Neutral IPv4 address spaces can be used for address translation when there is an overlap or conflict between two networks that need to communicate with each other. For example, you can use the 10.0.0.0/8, 172.16.0.0/12, or 192.168.0.0/16 address ranges, which are designated for private use, as neutral IPv4 address spaces for address translation2.

Reference:

SRX Getting Started - Configure VPN tunnel for site-to-site connectivity

SRX & J Series Site-to-Site VPN Configurator

Resolution Guide – SRX - Troubleshoot Static NAT

RFC 1918 - Address Allocation for Private Internets

Exhibit

You have recently configured Adaptive Threat Profiling and notice 20 IP address entries in the monitoring section of the Juniper ATP Cloud portal that do not match the number of entries locally on the SRX Series device, as shown in the exhibit.

What is the correct action to solve this problem on the SRX device?

A.
You must configure the DAE in a security policy on the SRX device.
A.
You must configure the DAE in a security policy on the SRX device.
Answers
B.
Refresh the feed in ATP Cloud.
B.
Refresh the feed in ATP Cloud.
Answers
C.
Force a manual download of the Proxy__Nodes feed.
C.
Force a manual download of the Proxy__Nodes feed.
Answers
D.
Flush the DNS cache on the SRX device.
D.
Flush the DNS cache on the SRX device.
Answers
Suggested answer: B

Explanation:

The correct action to solve this problem on the SRX device is to refresh the feed in ATP Cloud. This is because the number of IP address entries in the monitoring section of the Juniper ATP Cloud portal does not match the number of entries locally on the SRX Series device. This discrepancy can be caused by a number of factors, such as the SRX device not being properly configured for Adaptive Threat Profiling, or the feed not being properly downloaded from the Juniper ATP Cloud portal. By refreshing the feed in ATP Cloud, the SRX device can synchronize its local feed with the latest feed from the cloud service and ensure that the entries are consistent and accurate. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/security-adaptivethreat-profiling-configuring.html

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

A.
8080
A.
8080
Answers
B.
443
B.
443
Answers
C.
80
C.
80
Answers
D.
22
D.
22
Answers
Suggested answer: B

Explanation:

This is the port used for encrypted communication between the SRX series device and the Juniper ATP Appliance

In order to enroll an SRX Series device with Juniper ATP Appliance, the firewall device must have port 443 open. Port 443 is the default port used for HTTPS traffic, the communication between the SRX Series device and the ATP Appliance needs to be encrypted, that's why this port should be opened.

Which two types of source NAT translations are supported in this scenario? (Choose two.)

A.
translation of IPv4 hosts to IPv6 hosts with or without port address translation
A.
translation of IPv4 hosts to IPv6 hosts with or without port address translation
Answers
B.
translation of one IPv4 subnet to one IPv6 subnet with port address translation
B.
translation of one IPv4 subnet to one IPv6 subnet with port address translation
Answers
C.
translation of one IPv6 subnet to another IPv6 subnet without port address translation
C.
translation of one IPv6 subnet to another IPv6 subnet without port address translation
Answers
D.
translation of one IPv6 subnet to another IPv6 subnet with port address translation
D.
translation of one IPv6 subnet to another IPv6 subnet with port address translation
Answers
Suggested answer: A, C

Explanation:

The two types of source NAT translations that are supported in this scenario are translation of IPv4 hosts to IPv6 hosts with or without port address translation, and translation of one IPv6 subnet to another IPv6 subnet without port address translation. These are the types of source NAT translations that are supported by the Junos OS for IPv6 NAT. Translation of IPv4 hosts to IPv6 hosts allows IPv4-only hosts to communicate with IPv6-only hosts by changing the source IPv4 address to a corresponding IPv6 address. Port address translation can be optionally enabled to conserve IPv6 addresses by using different port numbers for different sessions. Translation of one IPv6 subnet to another IPv6 subnet allows IPv6 hosts to use a different IPv6 address range for outbound traffic, such as for security or policy reasons. Port address translation is not supported for this type of translation, as IPv6 addresses are abundant and do not need to be conserved. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-nat-ipv6-overview.html

Exhibit

Referring to the exhibit, which statement is true?

A.
This custom block list feed will be used before the Juniper Seclntel
A.
This custom block list feed will be used before the Juniper Seclntel
Answers
B.
This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.
B.
This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.
Answers
C.
This custom block list feed will be used instead of the Juniper Seclntel block list feed
C.
This custom block list feed will be used instead of the Juniper Seclntel block list feed
Answers
D.
This custom block list feed will be used after the Juniper Seclntel block list feed.
D.
This custom block list feed will be used after the Juniper Seclntel block list feed.
Answers
Suggested answer: C

Explanation:

According to the Juniper documentation, a custom block list feed is a user-defined list of IP addresses or URLs that are considered malicious or unwanted. A custom block list feed can be configured to override the default Juniper Seclntel block list feed, which is a cloud-based service that provides a list of known malicious IP addresses and URLs. To override the Juniper Seclntel block list feed, the custom block list feed must have a higher priority value than the Juniper Seclntel block list feed. In the exhibit, the custom block list feed has a priority value of 10, which is higher than the default priority value of 5 for the Juniper Seclntel block list feed. Therefore, this custom block list feed will be used instead of the Juniper Seclntel block list feed. Reference: : [Configuring Custom Block List Feeds]

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

A.
200l:DB8:0:f101;:2
A.
200l:DB8:0:f101;:2
Answers
B.
192.168.30.191
B.
192.168.30.191
Answers
C.
192.168.30.190
C.
192.168.30.190
Answers
D.
192.168.30.188
D.
192.168.30.188
Answers
Suggested answer: B, C

Explanation:

The SRX Series device will continue to send requests to authentication servers 192.168.30.190 and 192.168.30.191. This is because the exhibit shows the output of the show network-access aaa radiusservers command. This command displays the status of the RADIUS servers configured on the device.

In the output, we can see that there are three RADIUS servers configured - 192.168.30.190, 192.168.30.191, and 2001:DB8:0:f101::2. However, the status of the third server is shown as "DOWN". This means that the device is not able to communicate with this server. Therefore, the device will continue to send requests to the other two servers - 192.168.30.190 and 192.168.30.191. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/reference/commandsummary/show-network-access-aaa-radius-servers.html

All interfaces involved in transparent mode are configured with which protocol family?

A.
mpls
A.
mpls
Answers
B.
bridge
B.
bridge
Answers
C.
inet
C.
inet
Answers
D.
ethernet — switching
D.
ethernet — switching
Answers
Suggested answer: B

Explanation:

In transparent mode, all interfaces involved are configured with the bridge protocol family. This allows the SRX device to act as a bridge between the interfaces and forward traffic transparently without any modification. The bridge interfaces can be configured to forward traffic based on layer 2 headers, such as MAC addresses, without the need for routing or IP addressing.

Total 115 questions
Go to page: of 12