ExamGecko
Home Home / Juniper / JN0-636

Juniper JN0-636 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











What are two valid modes for the Juniper ATP Appliance? (Choose two.)

A.
flow collector
A.
flow collector
Answers
B.
event collector
B.
event collector
Answers
C.
all-in-one
C.
all-in-one
Answers
D.
core
D.
core
Answers
Suggested answer: C, D

Explanation:

The two valid modes for the Juniper ATP Appliance are all-in-one and core. The all-in-one mode is a single appliance that performs both the collector and the core functions. The collector function collects traffic from the network and sends it to the core function for analysis and detection. The core function performs the threat detection, mitigation, and analytics. The all-in-one mode is suitable for small to medium-sized networks that do not require high scalability or performance. The core mode is a dedicated appliance that performs only the core function. The core mode is used in conjunction with one or more collector appliances that collect traffic from the network and send it to the core appliance for analysis and detection. The core mode is suitable for large-scale networks that require high scalability and performance. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-atp-applianceoverview.html

Exhibit

Referring to the exhibit, an internal host is sending traffic to an Internet host using the 203.0.113.1 reflexive address with source port 54311.

Which statement is correct in this situation?

A.
Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.
A.
Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.
Answers
B.
Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.
B.
Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.
Answers
C.
Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.
C.
Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.
Answers
D.
Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.
D.
Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.
Answers
Suggested answer: B

Explanation:

According to the Juniper documentation, reflexive NAT is a type of source NAT that allows an internal host to communicate with an external host using a single public IP address and port. The reflexive NAT session is created when the internal host initiates the traffic to the external host, and the session is deleted when the traffic stops. The reflexive NAT session is bidirectional, meaning that the external host can send traffic back to the internal host using the same public IP address and port that the internal host used to reach the external host. However, the external host cannot initiate a new session to the internal host using the same public IP address and port, unless the internal host has already established a session with the external host. Therefore, only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311. Reference: [Configuring Reflexive NAT]

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

A.
1
A.
1
Answers
B.
3
B.
3
Answers
C.
4
C.
4
Answers
D.
2
D.
2
Answers
Suggested answer: A

Explanation:

An IKE security association (SA) is a set of parameters that define how the Internet Key Exchange (IKE) protocol will authenticate and establish the secure channel between the IPsec VPN peers. When you configure an IPsec VPN, one IKE SA is created between the peers, regardless of how many CoS forwarding classes are used to separate the traffic. The SA will be used to negotiate the IPsec SA parameters, such as encryption algorithms and keys.

In this scenario, only 1 IKE security association is required between the IPsec peers, no matter how many CoS forwarding classes are used to separate the voice and data traffic.

You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)

A.
Enroll the devices with Juniper ATP Appliance.
A.
Enroll the devices with Juniper ATP Appliance.
Answers
B.
Enroll the devices with Juniper ATP Cloud.
B.
Enroll the devices with Juniper ATP Cloud.
Answers
C.
Enable a third-party Tor feed.
C.
Enable a third-party Tor feed.
Answers
D.
Create a custom feed containing all current known MAC addresses.
D.
Create a custom feed containing all current known MAC addresses.
Answers
Suggested answer: B, C

Explanation:

The two steps that will fulfill the requirement of deploying a security policy on an SRX Series device that blocks all known Tor network IP addresses are enrolling the devices with Juniper ATP Cloud and enabling a third-party Tor feed. Juniper ATP Cloud is a cloud-based service that provides advanced threat detection and mitigation capabilities for SRX Series devices. By enrolling the devices with Juniper ATP Cloud, the devices can leverage the cloud intelligence and analytics to identify and block malicious traffic, including Tor traffic. A third-party Tor feed is a source of information that provides a list of IP addresses that are associated with the Tor network. By enabling a third-party Tor feed on the SRX Series device, the device can use the feed to create a dynamic address object that contains all the known Tor IP addresses. The device can then apply a security policy that denies traffic from or to the dynamic address object, effectively blocking the Tor network IP addresses. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-atp-cloudoverview.html

https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/securityintelligence-third-party-feed-configuring.html

Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?

A.
Juniper ATP Cloud
A.
Juniper ATP Cloud
Answers
B.
Juniper Secure Analytics
B.
Juniper Secure Analytics
Answers
C.
Juniper ATP Appliance
C.
Juniper ATP Appliance
Answers
D.
Juniper Security Director
D.
Juniper Security Director
Answers
Suggested answer: A

Explanation:

Juniper ATP Cloud provides zero-day malware protection for non-Juniper firewalls. It's a cloud-based service that analyzes files and network traffic to detect and prevent known and unknown (zero-day) threats. It uses a combination of static and dynamic analysis techniques, as well as machine learning, to detect and block malicious files, even if they are not known to traditional anti-virus software. It also provides real-time visibility and detailed forensics for incident response and remediation.

Exhibit

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

A.
Add multipoint to the st0.0 interface configuration on the branch1 device.
A.
Add multipoint to the st0.0 interface configuration on the branch1 device.
Answers
B.
Change the IKE proposal-set to compatible on the branch1 and corporate devices.
B.
Change the IKE proposal-set to compatible on the branch1 and corporate devices.
Answers
C.
Change the local identity to inet advpn on the branch1 device.
C.
Change the local identity to inet advpn on the branch1 device.
Answers
D.
Change the IKE mode to aggressive on the branch1 and corporate devices.
D.
Change the IKE mode to aggressive on the branch1 and corporate devices.
Answers
Suggested answer: C

Explanation:

According to the Juniper documentation, the local identity for an IPsec VPN tunnel must match the remote identity of the peer device. The local identity can be configured as an IP address, a hostname, a distinguished name, or an advpn identifier. The advpn identifier is used for dynamic VPNs that support multiple remote endpoints. In the exhibit, the corporate device has the local identity configured as inet advpn, which means it expects the branch1 device to have the same remote identity. However, the branch1 device has the local identity configured as inet, which does not match the corporate device's remote identity. Therefore, the IKE negotiation fails and the IPsec tunnel is not established. To solve this problem, the local identity on the branch1 device should be changed to inet advpn, so that it matches the corporate device's remote identity. Reference: [Configuring an IKE Gateway] 1, [Configuring Local and Remote Identities] 2

1: https://www.juniper.net/documentation/us/en/software/junos/vpnipsec/topics/task/configuration/security-ike-gateway-configuring.html 2:

https://www.juniper.net/documentation/us/en/software/junos/vpn-ipsec/topics/topicmap/security-ipsec-vpn-identities.html

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.
The SRX-1 device can use the Proxy__Nodes feed in another security policy.
A.
The SRX-1 device can use the Proxy__Nodes feed in another security policy.
Answers
B.
You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.
B.
You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.
Answers
C.
The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.
C.
The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.
Answers
D.
You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.
D.
You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.
Answers
Suggested answer: C, D

Explanation:

The exhibit shows the output of the show security intelligence category summary command on the SRX-1 device. This command displays the status of the security intelligence categories configured on the device. In the output, we can see that there are two categories configured - Proxy_Nodes and Proxy_Node3. The Proxy_Nodes category is a custom category that is created by the SRX-1 device using the adaptive threat profiling feature. The Proxy_Node3 category is a third-party category that is downloaded from the Juniper ATP Cloud service. The Proxy_Nodes category contains the IP addresses that match the security policy named Proxy-ATP on the SRX-1 device. The Proxy_Node3 category contains the IP addresses that are associated with the Tor network.

The two statements that are true based on the exhibit are:

The SRX-1 device creates the Proxy_Nodes feed, so it cannot use it in another security policy. This is because the adaptive threat profiling feature does not allow the device that creates the feed to use it in another security policy. The feed is intended to be shared with other devices in the same realm through the Juniper ATP Cloud service. The SRX-1 device can only use the feeds that are created by other devices or downloaded from third-party sources.

You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device. This is because the Proxy_Node3 feed is a third-party feed that is downloaded from the Juniper ATP Cloud service. The SRX-1 device can use this feed as a dynamic address object in its security policies. However, the feed is configured with the destinationonly option, which means that it can only be used as the destination-address match criteria of a security policy. The source-address match criteria of a security policy cannot use this feed.

Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/showsecurity-intelligence-category-summary.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-intelligence-thirdparty-feed-configuring.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-adaptive-threatprofiling-overview.html

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

A.
Configure the tenant as TSYS1 for the pi security profile.
A.
Configure the tenant as TSYS1 for the pi security profile.
Answers
B.
Configure the tenant as root for the pi security profile.
B.
Configure the tenant as root for the pi security profile.
Answers
C.
Configure the tenant as master for the pi security profile.
C.
Configure the tenant as master for the pi security profile.
Answers
D.
Configure the tenant as local for the pi security profile
D.
Configure the tenant as local for the pi security profile
Answers
Suggested answer: D

Explanation:

According to the Juniper documentation, a tenant system is a logical system that supports routing, services, and security features. A tenant system can be configured to log binary security events to a remote server using the pi security profile. The pi security profile specifies the tenant name, the server address, the server port, and the protocol for logging binary security events. In the exhibit, the pi security profile is configured with the server address 10.0.0.1, the server port 514, and the protocol UDP. However, the tenant name is missing from the configuration. To complete the configuration, the tenant name must be configured as local for the pi security profile. This is because the local tenant name is used to identify the tenant system that is sending the binary security events to the remote server. Therefore, the correct statement to complete the configuration is D. Configure the tenant as local for the pi security profile. Reference: [Tenant Systems Overview] 1, [Configuring Binary Security Event Logging for Tenant Systems] 2

1: https://www.juniper.net/documentation/us/en/software/junos/logical-systemsecurity/topics/topic-map/tenant-systems-overview.html

2: https://www.juniper.net/documentation/us/en/software/junos/logical-systemsecurity/ topics/task/security-tenant-systems-binary-logging-configuring.html

What is the purpose of the Switch Microservice of Policy Enforcer?

A.
to isolate infected hosts
A.
to isolate infected hosts
Answers
B.
to enroll SRX Series devices with Juniper ATP Cloud
B.
to enroll SRX Series devices with Juniper ATP Cloud
Answers
C.
to inspect traffic for malware
C.
to inspect traffic for malware
Answers
D.
to synchronize security policies to SRX Series devices
D.
to synchronize security policies to SRX Series devices
Answers
Suggested answer: A

Explanation:

The purpose of the Switch Microservice of Policy Enforcer is to isolate infected hosts. The Switch Microservice is a component of Policy Enforcer that runs on EX Series and QFX Series switches. It communicates with Policy Enforcer and Juniper ATP Cloud to receive threat intelligence and quarantine commands. When an infected host is detected by Juniper ATP Cloud, Policy Enforcer sends a command to the Switch Microservice to isolate the host by applying an access control list (ACL) on the switch port where the host is connected. The ACL blocks all traffic from or to the host except for the traffic that is required for remediation. The Switch Microservice also tracks the MAC address of the infected host and updates Policy Enforcer if the host moves to a different switch port or a different switch. This way, the Switch Microservice ensures that the infected host is isolated until it is remediated and no longer poses a threat to the network. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-policy-enforcerswitch-microservice-overview.html

Which two modes are supported on Juniper ATP Cloud? (Choose two.)

A.
global mode
A.
global mode
Answers
B.
transparent mode
B.
transparent mode
Answers
C.
private mode
C.
private mode
Answers
D.
Layer 3 mode
D.
Layer 3 mode
Answers
Suggested answer: B, D

Explanation:

According to the Juniper documentation, Juniper ATP Cloud supports the following modes:

Layer 3 mode: In this mode, the SRX Series device acts as a Layer 3 gateway and routes traffic between different subnets. The SRX Series device performs NAT and security policy enforcement on the traffic and sends a copy of the traffic to Juniper ATP Cloud for analysis. This mode is suitable for networks that have multiple subnets and require NAT and firewall functions1

Transparent mode: In this mode, the SRX Series device acts as a Layer 2 bridge and forwards traffic between the same subnet. The SRX Series device does not perform NAT or security policy enforcement on the traffic, but sends a copy of the traffic to Juniper ATP Cloud for analysis. This mode is suitable for networks that have a single subnet and do not require NAT or firewall functions1 The other two modes, global mode and private mode, are not supported by Juniper ATP Cloud.

Global mode is a configuration option for Juniper ATP Appliance, which is an on-premises solution that provides threat detection and prevention. Private mode is a configuration option for Juniper ATP Private Cloud, which is a cloud-based solution that provides threat detection and prevention within a private network23 Reference:

1: Juniper Advanced Threat Prevention Cloud | ATP Cloud | Juniper Networks 2: Juniper Advanced Threat Prevention Appliance | ATP Appliance | Juniper Networks 3: [Juniper Advanced Threat Prevention Private Cloud | ATP Private Cloud | Juniper Networks]

Total 115 questions
Go to page: of 12