ExamGecko
Home Home / Juniper / JN0-637

Juniper JN0-637 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

You need to generate a certificate for a PKI-based site-to-site VPN. The peer is expecting to

user your domain name vpn.juniper.net.

Which two configuration elements are required when you generate your certificate request? (Chose two,)

A.

ip-address 10.100.0.5

A.

ip-address 10.100.0.5

Answers
B.

subject CN=vpn.juniper.net

B.

subject CN=vpn.juniper.net

Answers
D.

domain-name vpn.juniper.net

D.

domain-name vpn.juniper.net

Answers
Suggested answer: B, D

You configured two SRX series devices in an active/passive multimode HA setup.

In this scenario, which statement is correct?

A.

Both devices are in the passive state until the activeness determination process is completed.

A.

Both devices are in the passive state until the activeness determination process is completed.

Answers
B.

Both devices start in a hold state until the activeness determination process is completed.

B.

Both devices start in a hold state until the activeness determination process is completed.

Answers
C.

Both devices start in the undiscovered state until the activeness determination process is completed.

C.

Both devices start in the undiscovered state until the activeness determination process is completed.

Answers
D.

Both devices are in the active state until the activeness determine determination process is completed.

D.

Both devices are in the active state until the activeness determine determination process is completed.

Answers
Suggested answer: D

Which two statements about transparent mode and Ethernet switching mode on an SRX series

device are correct.

A.

In Ethernet switching mode, Layer 2 interfaces must be placed in a security zone.

A.

In Ethernet switching mode, Layer 2 interfaces must be placed in a security zone.

Answers
B.

In Ethernet switching mode, IRB interfaces must be placed in a security zone.

B.

In Ethernet switching mode, IRB interfaces must be placed in a security zone.

Answers
C.

In transparent mode, Layer 2 interfaces must be placed in a security zone.

C.

In transparent mode, Layer 2 interfaces must be placed in a security zone.

Answers
D.

In transparent mode, IRB interfaces must be placed in a security zone.

D.

In transparent mode, IRB interfaces must be placed in a security zone.

Answers
Suggested answer: B, C

A customer wants to be able to initiate a return connection to an internal host from a specific

Server.

Which NAT feature would you use in this scenario?

A.

target-host

A.

target-host

Answers
B.

any-remote-host

B.

any-remote-host

Answers
C.

port-overloading

C.

port-overloading

Answers
D.

target-server

D.

target-server

Answers
Suggested answer: A

You are using AutoVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

In this scenario, which two statements are true? (Choose two.)

A.

New spoke sites can be added without explicit configuration on the hub.

A.

New spoke sites can be added without explicit configuration on the hub.

Answers
B.

Direct spoke-to-spoke tunnels can be established automatically.

B.

Direct spoke-to-spoke tunnels can be established automatically.

Answers
C.

All spoke-to-spoke IPsec communication will pass through the hub.

C.

All spoke-to-spoke IPsec communication will pass through the hub.

Answers
D.

AutoVPN requires OSPF over IPsec to discover and add new spokes.

D.

AutoVPN requires OSPF over IPsec to discover and add new spokes.

Answers
Suggested answer: A, C

You are configuring advanced policy-based routing. You have created a static route with next

hop of an interface in your inet.0 routing table

Referring to the exhibit, what should be changed to solve this issue?

A.

You should change the routing instance type to virtual-router.

A.

You should change the routing instance type to virtual-router.

Answers
B.

You should move the static route configuration to the main routing instance.

B.

You should move the static route configuration to the main routing instance.

Answers
C.

You should move the inet. o table before the routing instance table in your rib-groups configuration.

C.

You should move the inet. o table before the routing instance table in your rib-groups configuration.

Answers
D.

You should delete the interface-routes configuration under the routing-options hierarchy.

D.

You should delete the interface-routes configuration under the routing-options hierarchy.

Answers
Suggested answer: C

What are three attributes that APBR queries from the application system cache module. (Choose Three)

A.

TTL

A.

TTL

Answers
B.

destination port

B.

destination port

Answers
C.

service

C.

service

Answers
D.

DSCP

D.

DSCP

Answers
E.

protocol type

E.

protocol type

Answers
Suggested answer: B, C, E

Which two statements about policy enforcer and the forescout integration are true? (Choose two)

A.

802.1X authenticated devices are supported.

A.

802.1X authenticated devices are supported.

Answers
B.

802.1X authenticated devices are not supported.

B.

802.1X authenticated devices are not supported.

Answers
C.

A Forescout CounterACT agent must be installed on third-party devices

C.

A Forescout CounterACT agent must be installed on third-party devices

Answers
D.

A Forescout CounterACT agent is agentless and does not need to be installed on third-party device

D.

A Forescout CounterACT agent is agentless and does not need to be installed on third-party device

Answers
Suggested answer: A, D

Which three statements about persistent NAT are correct? (Choose Three)

A.

New sessions can only be initiated from a source towards the reflexive address.

A.

New sessions can only be initiated from a source towards the reflexive address.

Answers
B.

New sessions can be initiated from a destination towards the reflexive address.

B.

New sessions can be initiated from a destination towards the reflexive address.

Answers
C.

Persistent NAT only applies to source NAT.

C.

Persistent NAT only applies to source NAT.

Answers
D.

All requests from an internal address are mapped to the same reflexive address.

D.

All requests from an internal address are mapped to the same reflexive address.

Answers
E.

Persistent NAT applies to both destination and source NAT.

E.

Persistent NAT applies to both destination and source NAT.

Answers
Suggested answer: B, C, D

You Implement persistent NAT to allow any device on the external side of the firewall to

initiate traffic.

Referring to the exhibit, which statement is correct?

A.

The target-host parameter should be used instead of the any-remote-host parameter.

A.

The target-host parameter should be used instead of the any-remote-host parameter.

Answers
B.

The port-overloading parameter needs to be turned off in the NAT source interface configuration

B.

The port-overloading parameter needs to be turned off in the NAT source interface configuration

Answers
C.

The target-host-port parameter should be used instead of the any-remote-host parameter

C.

The target-host-port parameter should be used instead of the any-remote-host parameter

Answers
D.

The any-remote-host parameter does not support interface-based NAT and needs an IP pod to work.

D.

The any-remote-host parameter does not support interface-based NAT and needs an IP pod to work.

Answers
Suggested answer: D
Total 115 questions
Go to page: of 12