ExamGecko
Home Home / Juniper / JN0-636

Juniper JN0-636 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Exhibit

A.
The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.What are two appropriate mitigation actions for the selected incident? (Choose two.)
A.
The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.What are two appropriate mitigation actions for the selected incident? (Choose two.)
Answers
B.
Immediate response required: Block malware IP addresses (download server or CnC server)
B.
Immediate response required: Block malware IP addresses (download server or CnC server)
Answers
C.
Immediate response required: Wipe infected endpoint hosts.
C.
Immediate response required: Wipe infected endpoint hosts.
Answers
D.
Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.
D.
Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.
Answers
E.
Not an urgent action: Use IVP to confirm if machine is infected.
E.
Not an urgent action: Use IVP to confirm if machine is infected.
Answers
Suggested answer: A, C

Explanation:

The appropriate mitigation actions for the selected incident are to block malware IP addresses (download server or CnC server) and to deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected. This is because the incident shows a progression level of "Download" in the kill chain, which means that the malware has been downloaded and is likely to be executed. Blocking the malware IP addresses can prevent further communication with the malicious server and stop the malware from receiving commands or exfiltrating data. Deploying IVP integration can help verify the infection status of the endpoint and provide additional information about the malware behavior and impact. IVP integration is an optional feature that allows the ATP Appliance to interact with third-party endpoint security solutions such as Carbon Black, Cylance, and CrowdStrike. Reference:

Advanced Threat Prevention Appliance Solution Brief

Advanced Threat Prevention Appliance Datasheet

[Advanced Threat Prevention Appliance Mitigation Actions]

[Advanced Threat Prevention Appliance IVP Integration]

Exhibit

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

A.
IBGP
A.
IBGP
Answers
B.
OSPF
B.
OSPF
Answers
C.
IPsec
C.
IPsec
Answers
D.
DHCP
D.
DHCP
Answers
E.
NTP
E.
NTP
Answers
Suggested answer: B, D, E

Explanation:

The exhibit shows the output of the "show interfaces ge-0/0/5.0 extensive" command on an SRX

Series device. The output includes a section called "Security" that lists the protocols that are allowed on the ge-0/0/5.0 interface. The protocols that are allowed on the ge-0/0/5.0 interface are:

OSPF

DHCP

NTP

It's important to notice that the output don't have IBGP, IPsec, so these protocols are not allowed on the ge-0/0/5.0 interface.

Exhibit

Referring to the exhibit, which type of NAT is being performed?

A.
Static NAT
A.
Static NAT
Answers
B.
Destination NAT
B.
Destination NAT
Answers
C.
Persistent NAT
C.
Persistent NAT
Answers
D.
Source NAT
D.
Source NAT
Answers
Suggested answer: D

Explanation:

Source NAT is a type of NAT that is used to translate the source IP address and port number of a packet. This is typically used to allow multiple devices on a private network to access the internet using a single public IP address. In the exhibit, we can see that the source IP address and port number of the packet are being translated from 10.10.10.2/61606 to 203.0.113.100/179. This is a clear indication that Source NAT is being performed. Reference:

Network Address Translation Feature Guide SRX NAT with Illustrated Examples

Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?

A.
The number of traffic selectors configured for the VPN.
A.
The number of traffic selectors configured for the VPN.
Answers
B.
The number of CoS queues configured for the VPN.
B.
The number of CoS queues configured for the VPN.
Answers
C.
The number of classifiers configured for the VPN.
C.
The number of classifiers configured for the VPN.
Answers
D.
The number of forwarding classes configured for the VPN.
D.
The number of forwarding classes configured for the VPN.
Answers
Suggested answer: D

Explanation:

In IPsec CoS-based VPNs, the number of IPsec Security Associations (SAs) associated with a peer is based on the number of forwarding classes configured for the VPN. The forwarding classes are used to classify and prioritize different types of traffic, such as voice and data traffic. Each forwarding class requires a separate IPsec SA to be established between the peers, in order to provide the appropriate level of security and quality of service for each type of traffic.

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

A.
LLDP-MED
A.
LLDP-MED
Answers
B.
IGMP snooping
B.
IGMP snooping
Answers
C.
RSTP
C.
RSTP
Answers
D.
packet flooding
D.
packet flooding
Answers
Suggested answer: D

Explanation:

The SRX Series device in transparent mode uses packet flooding to learn about unknown devices in a network. Packet flooding is a process wherein the device sends out packets to every device it knows about or suspects in the network. When the packets are returned, the device can identify and classify the unknown devices in the network.

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts What will solve this problem?

A.
Disable PAT.
A.
Disable PAT.
Answers
B.
Enable destination NAT.
B.
Enable destination NAT.
Answers
C.
Enable persistent NAT
C.
Enable persistent NAT
Answers
D.
Enable address persistence.
D.
Enable address persistence.
Answers
Suggested answer: D

Explanation:

The solution to this problem is to enable address persistence. This will ensure that the same external IP address is used for multiple sessions between an internal host and an external host. This will result in only one authentication being required, as the same external IP address will be used for all sessions.

You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud

Which command will return this information?

A.
show security dynamic—address category—name CC | match 203.0.113.5
A.
show security dynamic—address category—name CC | match 203.0.113.5
Answers
B.
show security dynamic—address category—name Infected—Hosts | match 203.0.113.5
B.
show security dynamic—address category—name Infected—Hosts | match 203.0.113.5
Answers
C.
show security dynamic-address category-name IP Filter I match 203.0.113.5
C.
show security dynamic-address category-name IP Filter I match 203.0.113.5
Answers
D.
show Security dynamic-address category-name JWAS | match 203.0.113.5
D.
show Security dynamic-address category-name JWAS | match 203.0.113.5
Answers
Suggested answer: A

Explanation:

The command "show security dynamic-address category-name DS hield" will show the IP addresses that are part of the DS hield category. By filtering the output of this command with the "match 203.0.113.5" command, you can determine if the IP address 203.0.113.5 is part of the DS hield feed.

This command will check the feeds that are configured on SRX Series device and are associated to juniper ATP Cloud.

You want to use selective stateless packet-based forwarding based on the source address.

In this scenario, which command will allow traffic to bypass the SRX Series device flow daemon?

A.
set firewall family inet filter bypaa3_flowd term t1 then skip—services accept
A.
set firewall family inet filter bypaa3_flowd term t1 then skip—services accept
Answers
B.
set firewall family inet filter bypass_flowd term t1 then routing-instance stateless
B.
set firewall family inet filter bypass_flowd term t1 then routing-instance stateless
Answers
C.
set firewall family inet filter bypas3_flowd term t1 then virtual-channel stateless
C.
set firewall family inet filter bypas3_flowd term t1 then virtual-channel stateless
Answers
D.
set firewall family inet filter bypass__f lowd term t1 then packet—mode
D.
set firewall family inet filter bypass__f lowd term t1 then packet—mode
Answers
Suggested answer: D

Explanation:

The command that will allow traffic to bypass the SRX Series device flow daemon based on the source address is set firewall family inet filter bypass_flowd term t1 then packet-mode. This command configures a stateless firewall filter named bypass_flowd that has one term t1. The term t1 can match the traffic based on the source address or any other criteria. The term t1 then applies the action packet-mode, which means that the traffic will be forwarded using packet-based processing and will not be sent to the flow daemon for stateful inspection. This feature is known as selective stateless packet-based forwarding and it allows you to use both flow-based and packet-based forwarding on the same device for different types of traffic. You can apply the firewall filter to the input or output direction of an interface to enable selective stateless packet-based forwarding for the traffic passing through that interface. Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/concept/firewall-filter-option-filterbased-forwarding-overview.html

https://www.juniper.net/documentation/en_US/junos/topics/example/filter-based-forwardingexample.html

You are requested to enroll an SRX Series device with Juniper ATP Cloud.

Which statement is correct in this scenario?

A.
If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.
A.
If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.
Answers
B.
The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.
B.
The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.
Answers
C.
When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period
C.
When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period
Answers
D.
Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.
D.
Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.
Answers
Suggested answer: D

Explanation:

Juniper ATP Cloud is a cloud-based service that provides advanced threat prevention and detection for SRX Series devices. To enroll an SRX Series device with Juniper ATP Cloud, you need to have a valid license and authorization code, and you need to run a Junos OS op script on the device. The op script performs the following tasks:

Downloads and installs certificate authority (CA) licenses onto your SRX Series device.

Creates local certificates and enrolls them with the cloud server.

Performs basic Juniper ATP Cloud configuration on the SRX Series device.

Establishes a secure connection to the cloud server.

You can run the op script either by copying the CLI command from the Juniper ATP Cloud Web Portal and running it on the device, or by using the enroll command on the device. The op script is the only way to enroll an SRX Series device with Juniper ATP Cloud. You cannot enroll the device manually or by using other methods.

The other statements in the question are incorrect for the following reasons:

If a device is already enrolled in a realm and you enroll it in a new realm, none of the device data or configuration information is propagated to the new realm. This includes history, infected hosts feeds, logging, API tokens, and administrator accounts. You can view and change the realm association of a device from the Realm Management page in the Juniper ATP Cloud Web Portal.

The only way to enroll an SRX Series device is not to interact with the Juniper ATP Cloud Web Portal.

You can also use the enroll command on the device, which performs all the necessary enrollment steps without requiring you to access the Web Portal.

When the license expires, the SRX Series device is not disenrolled from Juniper ATP Cloud without a grace period. The device enters a grace period of 30 days, during which it can still send files to the cloud for inspection and receive threat intelligence feeds. After the grace period, the device is disenrolled and stops communicating with the cloud.

Reference:

How to Enroll Your SRX Series Firewalls in Juniper Advanced Threat Prevention (ATP) Cloud Using Policy Enforcer

Enroll an SRX Series Firewall using Juniper ATP Cloud Web Portal

ATP Cloud | Step 2: Up and Running

Enroll an SRX Series Firewall Using the CLI

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.
The data that traverses the ge-0/070 interface is secured by a secure association key.
A.
The data that traverses the ge-0/070 interface is secured by a secure association key.
Answers
B.
The data that traverses the ge-070/0 interface can be intercepted and read by anyone.
B.
The data that traverses the ge-070/0 interface can be intercepted and read by anyone.
Answers
C.
The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.
C.
The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.
Answers
D.
The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.
D.
The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.
Answers
Suggested answer: A, C

Explanation:

The exhibit shows the output of the show security macsec statistics interface ge-0/0/70 detail command on an SRX Series device. This command displays the statistics for the Media Access Control Security (MACsec) feature on the ge-0/0/70 interface. MACsec is a feature that provides point-topoint security on Ethernet links by using encryption and data integrity checks. MACsec uses two types of keys to secure the traffic: the Connectivity Association Key (CAK) and the Secure Association Key (SAK). The CAK is used for authentication and key exchange between the MACsec peers. The SAK is used for encryption and decryption of the MACsec traffic.

The two statements that are true based on the exhibit are:

The data that traverses the ge-0/0/70 interface is secured by a secure association key. This is because the exhibit shows that the interface has a Secure Channel (SC) and a Secure Association (SA) established. The SC is a logical connection between the MACsec peers that carries the encrypted traffic. The SA is a subset of the SC that contains the SAK and other parameters for encrypting and decrypting the traffic. The exhibit shows that the interface has encrypted and protected packets, which means that the traffic is secured by the SAK.

The data that traverses the ge-0/0/70 interface cannot be intercepted and read by anyone. This is because the exhibit shows that the interface has encryption enabled. The encryption option indicates whether the MACsec traffic is encrypted or not. If encryption is enabled, the traffic is encrypted by the SAK and cannot be viewed by anyone monitoring the link. If encryption is disabled, the traffic is only protected by the SAK and can be viewed by anyone monitoring the link.

Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-macsec-statistics-interface-detail.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-macsecoverview.html

Total 115 questions
Go to page: of 12