ExamGecko
Home Home / Juniper / JN0-636

Juniper JN0-636 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

A.
STUN
A.
STUN
Answers
B.
Proxy ARP
B.
Proxy ARP
Answers
C.
Persistent NAT
C.
Persistent NAT
Answers
D.
DNS Doctoring
D.
DNS Doctoring
Answers
Suggested answer: B

Explanation:

Proxy ARP is a technique used by routers to answer ARP requests on one network segment on behalf of hosts on another network segment. This is useful in situations where a host on one network segment needs to communicate with a host on another network segment, but the two hosts are not directly connected. In this case, the router acts as a proxy, answering ARP requests on behalf of the other host. In the exhibit, the vSRX device is configured to use a pool of addresses that are in the same subnet as the external interface ge-0/0/0 for source NAT. This means that the vSRX device will translate the source IP address of the internal hosts to one of the addresses in the pool before sending the packets to the external network. However, the external hosts will not know how to reach the NATed addresses, since they are not directly connected to the vSRX device. They will send ARP requests for the NATed addresses, expecting to receive a MAC address from the vSRX device. If proxy ARP is not enabled on the vSRX device, it will not respond to these ARP requests, since it does not have the NATed addresses configured on its interface. The ARP requests will time out and the packets will be dropped by the external hosts or the service provider router. To solve this problem, proxy ARP must be enabled on the vSRX device for the NATed addresses. This will allow the vSRX device to respond to the ARP requests from the external hosts, providing its own MAC address as the destination. The external hosts will then send the packets to the vSRX device, which will reverse the NAT and forward the packets to the internal hosts. Reference:

Configuring Proxy ARP (CLI Procedure)

[SRX] When and how to configure Proxy ARP (https://supportportal.juniper.net/s/article/SRXDynamic-

VPN-scenario-for-configuring-Proxy-ARP-on-SRX?language=en_US)

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

A.
In the show security policies hit-count command output.
A.
In the show security policies hit-count command output.
Answers
B.
In the show security flow statistics command output.
B.
In the show security flow statistics command output.
Answers
C.
In the show security policies detail command output.
C.
In the show security policies detail command output.
Answers
D.
In the show firewall log command output.
D.
In the show firewall log command output.
Answers
Suggested answer: C

Explanation:

The result of adding the count action to a security policy can be seen in the show security policies detail command output. The count action is a feature that allows you to enable statistics collection for sessions that enter the device for a given policy, and for the number of packets and bytes that pass through the device in both directions for a given policy. The count action can help you to monitor the traffic that matches a security policy and to troubleshoot security policy issues. The show security policies detail command displays the detailed information about the security policies configured on the device, including the count statistics. The output shows the number of packets and bytes that have been processed by the policy in both directions, as well as the number of sessions that have been created by the policy. You can use this command to verify that the count action is working as expected and to see the traffic volume and session count for each policy. Reference:

Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/showsecurity-policies-detail.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-policy-countoverview.html

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.
The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.
A.
The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.
Answers
B.
You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.
B.
You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.
Answers
C.
The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1
C.
The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1
Answers
D.
Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.
D.
Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.
Answers
Suggested answer: C, D

Explanation:

The suspicious_Endpoints feed is a dynamic address group that is created by Juniper ATP Cloud based on the IoT device discovery and policy enforcement feature. This feature allows the SRX Series device to send IoT traffic to Juniper ATP Cloud for analysis and classification. Juniper ATP Cloud then creates a threat feed that contains the IP addresses of the suspicious IoT devices and sends it back to the SRX Series device. The SRX Series device can then use this feed to create and enforce security policies for the IoT traffic. The suspicious_Endpoints feed is usable by any SRX Series device that is a part of the same realm as SRX-1, because the feed is shared among the devices that belong to the same Juniper ATP Cloud realm. Juniper ATP Cloud automatically creates the suspicious_Endpoints feed after you commit the security policy that references the feed, because the feed is dynamically generated based on the IoT traffic analysis. You do not need to manually create the feed in the Juniper ATP Cloud interface. Reference:

Example- Configure IoT Device Discovery and Policy Enforcement

Juniper Advanced Threat Prevention Cloud Policy Overview

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

A.
device profile
A.
device profile
Answers
B.
SSL proxy profile
B.
SSL proxy profile
Answers
C.
infected host profile
C.
infected host profile
Answers
D.
C&C profile
D.
C&C profile
Answers
E.
malware profile
E.
malware profile
Answers
Suggested answer: C, D, E

Explanation:

The three profiles that are configurable in a threat prevention policy are infected host profile, C&C profile, and malware profile. A threat prevention policy is a feature of Juniper ATP Cloud that provides protection and monitoring for selected threat profiles, including command and control servers, infected hosts, and malware. Using feeds from Juniper ATP Cloud and optional custom feeds that you configure, ingress and egress traffic is monitored for suspicious content and behavior. Based on a threat score, detected threats are evaluated and action may be taken once a verdict is reached.

You can create a threat prevention policy by selecting one or more of the following profiles:

Infected host profile: This profile detects and blocks traffic from hosts that are infected with malware or compromised by attackers. You can configure the threat score thresholds and the actions for different levels of severity. You can also enable Geo IP filtering to block traffic from or to specific countries or regions.

C&C profile: This profile detects and blocks traffic to or from command and control servers that are used by attackers to control malware or botnets. You can configure the threat score thresholds and the actions for different levels of severity. You can also enable Geo IP filtering to block traffic from or to specific countries or regions.

Malware profile: This profile detects and blocks traffic that contains malware or malicious content.

You can configure the threat score thresholds and the actions for different levels of severity. You can also enable protocol-specific settings for HTTP and SMTP traffic, such as file type filtering, file size filtering, and file name filtering.

The other two profiles, device profile and SSL proxy profile, are not configurable in a threat prevention policy. A device profile is a feature of Policy Enforcer that defines the device type, the device group, and the device settings for the SRX Series devices that are enrolled with Juniper ATP Cloud. An SSL proxy profile is a feature of SRX Series devices that enables SSL proxy to decrypt and inspect SSL/TLS traffic for threats and policy violations.

Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos-space23.1/policyenforcer/topics/concept/threat-management-policy-overview.html

https://www.juniper.net/documentation/en_US/junos-space23.1/policyenforcer/topics/task/configuration/junos-space-policy-enforcer-threat-management-policyconfigure.

html://https://www.juniper.net/documentation/en_US/junos/topics/concept/securitypolicy-enforcer-device-profile-overview.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-ssl-proxyoverview.html

You are asked to download and install the IPS signature database to a device operating in chassis cluster mode. Which statement is correct in this scenario?

A.
You must download and install the IPS signature package on the primary node.
A.
You must download and install the IPS signature package on the primary node.
Answers
B.
The first synchronization of the backup node and the primary node must be performed manually.
B.
The first synchronization of the backup node and the primary node must be performed manually.
Answers
C.
The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node must be rebooted.
C.
The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node must be rebooted.
Answers
D.
The IPS signature package must be downloaded and installed on the primary and backup nodes.
D.
The IPS signature package must be downloaded and installed on the primary and backup nodes.
Answers
Suggested answer: A

Explanation:

The IPS signature database is one of the major components of the intrusion prevention system (IPS).

It contains definitions of different objects, such as attack objects, application signature objects, and service objects, that are used in defining IDP policy rules. As a response to new vulnerabilities, Juniper Networks periodically provides a file containing attack database updates on the Juniper Networks website. You can download this file to protect your network from new threats. Note: IPS does not need a separate license to run as a service on the SRX Series Firewall; however, a license is required for IPS updates1.

When you configure a chassis cluster, the two nodes back up each other, with one node acting as the primary device and the other as the secondary device, ensuring stateful failover of processes and services in the event of system or hardware failure. If the primary device fails, the secondary device takes over processing of traffic2.

To download and install the IPS signature database to a device operating in chassis cluster mode, you must perform the following steps:

Download the IPS signature package from the Juniper Networks website to the primary node of the chassis cluster. You can use the request security idp security-package download CLI command or the Security Director user interface to download the package. Note: You must have a valid license key installed on the device to download the package3.

Install the IPS signature package on the primary node of the chassis cluster. You can use the request security idp security-package install CLI command or the Security Director user interface to install the package. Note: You must reboot the primary node after installing the package3.

Synchronize the IPS signature package from the primary node to the backup node of the chassis cluster. You can use the request security idp security-package install-backup CLI command or the Security Director user interface to synchronize the package. Note: You do not need to reboot the backup node after synchronizing the package3.

Therefore, the correct answer is A. You must download and install the IPS signature package on the primary node. The other options are incorrect because:

B) The first synchronization of the backup node and the primary node is performed automatically after you install the package on the primary node. You do not need to perform it manually3.

C) The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node does not need to be rebooted. You only need to reboot the primary node after installing the package3.

D) The IPS signature package does not need to be downloaded and installed on the primary and backup nodes separately. You only need to download and install it on the primary node and then synchronize it to the backup node3.

Reference:

IDP Signature Database Overview

Understanding IDP Signature Database for Migration

Configuring Chassis Clustering on SRX Series Devices

Click the Exhibit button.

When attempting to enroll an SRX Series device to JATP, you receive the error shown in the exhibit.

What is the cause of the error?

A.
The fxp0 IP address is not routable
A.
The fxp0 IP address is not routable
Answers
B.
The SRX Series device certificate does not match the JATP certificate
B.
The SRX Series device certificate does not match the JATP certificate
Answers
C.
The SRX Series device does not have an IP address assigned to the interface that accesses JATP
C.
The SRX Series device does not have an IP address assigned to the interface that accesses JATP
Answers
D.
A firewall is blocking HTTPS on fxp0
D.
A firewall is blocking HTTPS on fxp0
Answers
Suggested answer: C

Explanation:

Reference: https://kb.juniper.net/InfoCenter/index?

page=content&id=KB33979&cat=JATP_SERIES&actp=LIST

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: D

Explanation:

https://www.juniper.net/documentation/us/en/software/junos/multicastl2/topics/ref/statement/family-ethernet-switching-edit-interfaces-qfx-series.html#statement-namestatement_d26608e73

Refer to the Exhibit.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.
Topology 3
A.
Topology 3
Answers
B.
Topology 5
B.
Topology 5
Answers
C.
Topology 2
C.
Topology 2
Answers
D.
Topology 4
D.
Topology 4
Answers
E.
Topology 1
E.
Topology 1
Answers
Suggested answer: A, D, E

Explanation:

Reference: https://www.juniper.net/documentation/en_US/junos-space17.2/policyenforcer/topics/concept/ policy-enforcer-deployment-supported-topologies.html

Click the Exhibit button.

Which type of NAT is shown in the exhibit?

A.
NAT46
A.
NAT46
Answers
B.
NAT64
B.
NAT64
Answers
C.
persistent NAT
C.
persistent NAT
Answers
D.
DS-Lite
D.
DS-Lite
Answers
Suggested answer: B

Which two additional configuration actions are necessary for the third-party feed shown in the exhibit to work properly? (Choose two.)

A.
You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.
A.
You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.
Answers
B.
You must create a dynamic address entry with the C&C category and the cc_offic365 value.
B.
You must create a dynamic address entry with the C&C category and the cc_offic365 value.
Answers
C.
You must apply the dynamic address entry in a security policy.
C.
You must apply the dynamic address entry in a security policy.
Answers
D.
You must apply the dynamic address entry in a security intelligence policy.
D.
You must apply the dynamic address entry in a security intelligence policy.
Answers
Suggested answer: A, C
Total 115 questions
Go to page: of 12