ExamGecko
Home Home / Juniper / JN0-637

Juniper JN0-637 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Which two statements about the differences between chassis cluster and multinode HA on

SRX series devices are true? (Choose Two)

A.

Multinode HA member nodes require Layer 2 connectivity.

A.

Multinode HA member nodes require Layer 2 connectivity.

Answers
B.

Multinode HA supports Layer 2 and Layer 3 connectivity between nodes.

B.

Multinode HA supports Layer 2 and Layer 3 connectivity between nodes.

Answers
C.

Multinode HA requires Layer 3 connectivity between nodes.

C.

Multinode HA requires Layer 3 connectivity between nodes.

Answers
D.

Chassis cluster member nodes require Layer 2 connectivity.

D.

Chassis cluster member nodes require Layer 2 connectivity.

Answers
Suggested answer: B, D

Referring to the exhibit, you are assigned the tenantSYS1 user credentials on an SRX series

device.

In this scenario, which two statements are correct? (Choose two.)

A.

When you log in to the device, you will be located at the operational mode of the main system hierarchy.

A.

When you log in to the device, you will be located at the operational mode of the main system hierarchy.

Answers
B.

When you log in to the device, you will be located at the operational mode of the Tenant.SY51 logical system hierarchy.

B.

When you log in to the device, you will be located at the operational mode of the Tenant.SY51 logical system hierarchy.

Answers
C.

When you log in to the device, you will be permitted to view only the routing tables for the Tenant SYS1 logical system.

C.

When you log in to the device, you will be permitted to view only the routing tables for the Tenant SYS1 logical system.

Answers
D.

When you log in to the device, you will be permitted to view all routing tables available on the on an SYS1 Series device.

D.

When you log in to the device, you will be permitted to view all routing tables available on the on an SYS1 Series device.

Answers
Suggested answer: B, C

A user reports that a specific application is not working properly. This application makes

multiple connection to the server and must have the same address every time from a pool and this behavior needs to be changed.

What would solve this problem?

A.

Use STUN.

A.

Use STUN.

Answers
B.

Use DNS doctoring.

B.

Use DNS doctoring.

Answers
C.

Use the address-persistent parameter.

C.

Use the address-persistent parameter.

Answers
D.

Use the persistent-nat parameter.

D.

Use the persistent-nat parameter.

Answers
Suggested answer: D

You have cloud deployments in Azure, AWS, and your private cloud. You have deployed

multicloud using security director with policy enforcer to. Which three statements are true in this scenario? (Choose three.)

A.

You can run Juniper ATP scans only on traffic from your private cloud.

A.

You can run Juniper ATP scans only on traffic from your private cloud.

Answers
B.

You can run Juniper ATP scans for all three domains.

B.

You can run Juniper ATP scans for all three domains.

Answers
C.

You must secure the policies individually by domain.

C.

You must secure the policies individually by domain.

Answers
D.

The Policy Enforcer is able to flag infected hosts in all three domains.

D.

The Policy Enforcer is able to flag infected hosts in all three domains.

Answers
E.

You can simultaneously manage the security policies in all three domains.

E.

You can simultaneously manage the security policies in all three domains.

Answers
Suggested answer: B, D, E

Which two statements describe the behavior of logical systems? (Choose two.)

A.

Each logical system shares the routing protocol process.

A.

Each logical system shares the routing protocol process.

Answers
B.

A default routing instance must be manually created for each logical system

B.

A default routing instance must be manually created for each logical system

Answers
C.

Each logical system has a copy of the routing protocol process.

C.

Each logical system has a copy of the routing protocol process.

Answers
D.

A default routing instance is automatically created for each logical system.

D.

A default routing instance is automatically created for each logical system.

Answers
Suggested answer: C, D

Which two statements are correct about advanced policy-based routing?

A.

It can use the application system cache to route traffic.

A.

It can use the application system cache to route traffic.

Answers
B.

The associated routing instance should be configured as a virtual router instance.

B.

The associated routing instance should be configured as a virtual router instance.

Answers
C.

It cannot use the application system cache to route traffic.

C.

It cannot use the application system cache to route traffic.

Answers
D.

The associated routing instance should be configured as a forwarding instance.

D.

The associated routing instance should be configured as a forwarding instance.

Answers
Suggested answer: A, D

You have deployed a new site as shown in the exhibit. Hosts in the 10.10.10.0/24 network

must access the DB1 server. The DB1 server must also have internet access the DB1 server encrypted.

Which two configuration statements will be required as part of the configuration on SRX1 to satisfy this requirement? (Choose two)

A.

set security macsec interfaces ge-0/0/1 connectivity association access-sw

A.

set security macsec interfaces ge-0/0/1 connectivity association access-sw

Answers
B.

set protocols 12-learning global mode transprent-bridge

B.

set protocols 12-learning global mode transprent-bridge

Answers
C.

set security forwarding-options secure-wire access-sw interface ge-0/0/1.0

C.

set security forwarding-options secure-wire access-sw interface ge-0/0/1.0

Answers
D.

set security macsec connectivity-association access-sw security-mode static-cak

D.

set security macsec connectivity-association access-sw security-mode static-cak

Answers
Suggested answer: A, D

Exhibit:

The Ipsec VPN does not establish when the peer initiates, but it does establish when the SRX

series device initiates. Referring to the exhibit, what will solve this problem?

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

Answers
B.

The screen configuration on the untrust zone needs to be modified.

B.

The screen configuration on the untrust zone needs to be modified.

Answers
C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

Answers
D.

Application tracking on the untrust zone needs to be removed.

D.

Application tracking on the untrust zone needs to be removed.

Answers
Suggested answer: C

You are experiencing problem with your ADVPN tunnels getting established. The tunnel

and egress interface are located in different zone. What are two reasons for these problems? (Choose two.)

A.

IKE is not an allowed protocol in the external interfaces' security zone.

A.

IKE is not an allowed protocol in the external interfaces' security zone.

Answers
B.

IKE is not an allowed protocol in the tunnel endpoints' security zone.

B.

IKE is not an allowed protocol in the tunnel endpoints' security zone.

Answers
C.

OSPF is not an allowed protocol in the tunnel endpoints' security zone.

C.

OSPF is not an allowed protocol in the tunnel endpoints' security zone.

Answers
D.

BGP is not an allowed protocol in the tunnel endpoints' security zone.

D.

BGP is not an allowed protocol in the tunnel endpoints' security zone.

Answers
Suggested answer: A, B

Which two statements are correct about DNS doctoring?

A.

The DNS ALG must be disabled.

A.

The DNS ALG must be disabled.

Answers
B.

Proxy ARP is required if your NAT pool for the server is on the same subnet as the uplink interface.

B.

Proxy ARP is required if your NAT pool for the server is on the same subnet as the uplink interface.

Answers
C.

Proxy ARP is required if your NAT pool for the server is on a different subnet as the uplink interface

C.

Proxy ARP is required if your NAT pool for the server is on a different subnet as the uplink interface

Answers
D.

The DNS ALG must be enabled.

D.

The DNS ALG must be enabled.

Answers
Suggested answer: B, D
Total 115 questions
Go to page: of 12