ExamGecko
Home Home / Juniper / JN0-637

Juniper JN0-637 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Referring to the exhibit,

which statement about TLS 1.2 traffic is correct?

A.

TLS 1.2 traffic will be sent to routing instance R1 but not forwarded to the next hop.

A.

TLS 1.2 traffic will be sent to routing instance R1 but not forwarded to the next hop.

Answers
B.

TLS 1.2 traffic will be sent to routing instance R1 and forwarded to next hop 10.1.0.1.

B.

TLS 1.2 traffic will be sent to routing instance R1 and forwarded to next hop 10.1.0.1.

Answers
C.

TLS 1.2 traffic will be sent to routing instance R2 but not forwarded to the next hop.

C.

TLS 1.2 traffic will be sent to routing instance R2 but not forwarded to the next hop.

Answers
D.

TLS 1.2 traffic will be sent to routing instance R2 and forwarded to next hop 10.2.0.1.

D.

TLS 1.2 traffic will be sent to routing instance R2 and forwarded to next hop 10.2.0.1.

Answers
Suggested answer: A

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

Answers
B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

Answers
C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

Answers
D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Answers
Suggested answer: A

Referring to the exhibit,

which two statements about User1 are true? (Choose two.)

A.

User1 has access to the configuration specific to their assigned logical system.

A.

User1 has access to the configuration specific to their assigned logical system.

Answers
B.

User1 is logged in to logical system LSYS-1.

B.

User1 is logged in to logical system LSYS-1.

Answers
C.

User1 can add logical units to an interface that a primary administrator has not previously assigned.

C.

User1 can add logical units to an interface that a primary administrator has not previously assigned.

Answers
D.

User1 can view outputs from other user logical systems.

D.

User1 can view outputs from other user logical systems.

Answers
Suggested answer: A, B

Explanation:

In this configuration, User1 is logged into logical system LSYS-1, which restricts access and visibility to that particular system. This ensures isolation between logical systems on the same physical device. Only a system administrator can assign additional permissions. For more details, see Juniper Logical Systems Guide.

From the exhibit, we see that User1 is logged into logical system LSYS-1:

Access to Assigned Logical System (Answer A): User1, being logged into the logical system LSYS-1, only has access to the configuration and interfaces within that logical system. This is a key feature of logical systems in Junos, ensuring users are restricted to their respective environments.

Logged into LSYS-1 (Answer B): The prompt shows that User1 is currently operating in LSYS-1, as indicated by the User1@SRX:LSYS-1> command line.

Exhibit:

You are asked to ensure that Internet users can access the company's internal webserver using its FQDN. However, the internal DNS server's A record only points to the webserver's private address.

Referring to the exhibit, which two actions are required to complete this task? (Choose two.)

A.

Disable the DNS ALG.

A.

Disable the DNS ALG.

Answers
B.

Configure static NAT for both the DNS server and the webserver.

B.

Configure static NAT for both the DNS server and the webserver.

Answers
C.

Configure destination NAT for both the DNS server and the webserver.

C.

Configure destination NAT for both the DNS server and the webserver.

Answers
D.

Configure proxy ARP on ge-0/0/3.

D.

Configure proxy ARP on ge-0/0/3.

Answers
Suggested answer: B, D

Explanation:

In the scenario where internal users are trying to access the company's web server via its FQDN but the DNS server resolves to a private IP, two key actions are needed:

Static NAT (Answer B): Since the internal DNS server resolves the web server to its private IP address (10.10.10.4/24), you need to configure static NAT for both the DNS server and the webserver. This will ensure that requests coming from the internet will be translated to the web server's public IP (203.0.113.4) and the DNS server's public IP (203.0.113.2).

Example Command:

bash

set security nat static rule-set public-to-private from zone untrust

set security nat static rule-set public-to-private rule dns-server match destination-address 203.0.113.2/32

set security nat static rule-set public-to-private rule dns-server then static-nat-prefix 10.10.10.2/32

set security nat static rule-set public-to-private rule web-server match destination-address 203.0.113.4/32

set security nat static rule-set public-to-private rule web-server then static-nat-prefix 10.10.10.4/32

Proxy ARP (Answer D): The SRX needs to respond to ARP requests for the public IP addresses of both the DNS and webserver on the interface facing the internet (ge-0/0/3). This allows the SRX to handle requests directed at the public IPs.

Example Command:

set interfaces ge-0/0/3 unit 0 family inet proxy-arp interface-address 203.0.113.2/32

set interfaces ge-0/0/3 unit 0 family inet proxy-arp interface-address 203.0.113.4/32

These two configurations allow external users to access the internal web server via its public IP, as resolved by the DNS server.

How does an SRX Series device examine exception traffic?

A.

The device examines the host-inbound traffic for the ingress interface and zone.

A.

The device examines the host-inbound traffic for the ingress interface and zone.

Answers
B.

The device examines the host-outbound traffic for the ingress interface and zone.

B.

The device examines the host-outbound traffic for the ingress interface and zone.

Answers
C.

The device examines the host-inbound traffic for the egress interface and zone.

C.

The device examines the host-inbound traffic for the egress interface and zone.

Answers
D.

The device examines the host-outbound traffic for the egress interface and zone.

D.

The device examines the host-outbound traffic for the egress interface and zone.

Answers
Suggested answer: A

Explanation:

Exception traffic, including management and control plane traffic, is handled by examining host-inbound traffic configurations at the ingress interface and zone. It ensures traffic reaches necessary services like SSH and IKE securely. See Juniper Host Inbound Traffic Documentation for more.

SRX Series devices handle exception traffic (such as management traffic like SSH, Telnet, DNS queries, etc.) differently than regular transit traffic. Exception traffic is examined based on host-inbound traffic for the ingress interface and zone. If traffic is destined for the device itself (e.g., management traffic or routing protocol messages), it must be allowed as host-inbound traffic on both the ingress interface and zone.

Example Command:

bash

set security zones security-zone trust host-inbound-traffic system-services ssh

This ensures that traffic destined to the SRX device is inspected based on the ingress interface and zone.

Exhibit:

Referring to the exhibit, a default static route on SRX-1 sends all traffic to ISP-

A.

You have configured APBR to send all requests for streaming video traffic to ISP-B. However, the return traffic from the streaming video server is coming through ISP-A, and the traffic is being dropped by SRX-1. You can only make changes on SRX-1. How do you solve this problem?

A.

You have configured APBR to send all requests for streaming video traffic to ISP-B. However, the return traffic from the streaming video server is coming through ISP-A, and the traffic is being dropped by SRX-1. You can only make changes on SRX-1. How do you solve this problem?

Answers
B.

Place both ISP-facing interfaces in the same zone.

B.

Place both ISP-facing interfaces in the same zone.

Answers
C.

Change the APBR routing instance from a forwarding instance to a virtual router instance.

C.

Change the APBR routing instance from a forwarding instance to a virtual router instance.

Answers
D.

Enable AppTrack to keep track of the sessions and zones for the streaming video traffic.

D.

Enable AppTrack to keep track of the sessions and zones for the streaming video traffic.

Answers
E.

Configure BGP to control the return path of the streaming video traffic.

E.

Configure BGP to control the return path of the streaming video traffic.

Answers
Suggested answer: D

You are configuring an interconnect logical system that is configured as a VPLS switch to allow two logical systems to communicate.

Which two parameters are required when configuring the logical tunnel interfaces? (Choose two.)

A.

Encapsulation ethernet must be used.

A.

Encapsulation ethernet must be used.

Answers
B.

The virtual tunnel interfaces should only be configured with two logical unit pairs per logical system interconnect.

B.

The virtual tunnel interfaces should only be configured with two logical unit pairs per logical system interconnect.

Answers
C.

The logical tunnel interfaces should be configured with two logical unit pairs per logical system interconnect.

C.

The logical tunnel interfaces should be configured with two logical unit pairs per logical system interconnect.

Answers
D.

Encapsulation ethernet-vpls must be used.

D.

Encapsulation ethernet-vpls must be used.

Answers
Suggested answer: C, D

Exhibit:

You have configured a CoS-based VPN that is not functioning correctly.

Referring to the exhibit, which action will solve the problem?

A.

You must delete one forwarding class.

A.

You must delete one forwarding class.

Answers
B.

You must change the loss priorities of the forwarding classes to low.

B.

You must change the loss priorities of the forwarding classes to low.

Answers
C.

You must use inet precedence instead of DSCP.

C.

You must use inet precedence instead of DSCP.

Answers
D.

You must change the code point for the DB-data forwarding class to 10000.

D.

You must change the code point for the DB-data forwarding class to 10000.

Answers
Suggested answer: A

Explanation:

In the exhibit, the CoS-based VPN configuration is not functioning correctly due to an issue with the number of forwarding classes. The maximum number of forwarding classes supported for CoS-based VPNs with multiple SAs (security associations) is typically four forwarding classes. In this case, more than four forwarding classes are defined.

To solve the issue, one forwarding class must be deleted to ensure that the total number of forwarding classes is reduced to four or fewer.

Exhibit:

Referring to the exhibit, which two statements are true? (Choose two.)

A.

Hosts in the Local zone can be enabled for control plane access to the SRX.

A.

Hosts in the Local zone can be enabled for control plane access to the SRX.

Answers
B.

An IRB interface is required to enable communication between the Trust and the Untrust zones.

B.

An IRB interface is required to enable communication between the Trust and the Untrust zones.

Answers
C.

You can configure security policies for traffic flows between hosts in the Local zone.

C.

You can configure security policies for traffic flows between hosts in the Local zone.

Answers
D.

Hosts in the Local zone can communicate with hosts in the Trust zone with a security policy.

D.

Hosts in the Local zone can communicate with hosts in the Trust zone with a security policy.

Answers
Suggested answer: A, D

Your customer needs embedded security in an EVPN-VXLAN solution.

What are two benefits of adding an SRX Series device in this scenario? (Choose two.)

A.

It enhances tunnel inspection for VXLAN encapsulated traffic with Layer 4-7 security services.

A.

It enhances tunnel inspection for VXLAN encapsulated traffic with Layer 4-7 security services.

Answers
B.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN underlay.

B.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN underlay.

Answers
C.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN overlay.

C.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN overlay.

Answers
D.

It enhances tunnel inspection for VXLAN encapsulated traffic with only Layer 4 security services.

D.

It enhances tunnel inspection for VXLAN encapsulated traffic with only Layer 4 security services.

Answers
Suggested answer: A, C

Explanation:

The SRX Series can inspect traffic within VXLAN tunnels, providing in-depth security services across multiple layers. Adding SRX in the overlay network allows comprehensive control, leveraging advanced firewall capabilities. For more details, see Juniper EVPN-VXLAN Security.

When integrating an SRX Series device into an EVPN-VXLAN solution, it offers several security benefits:

Layer 4-7 Security Services (Answer A): The SRX can provide deep packet inspection for VXLAN encapsulated traffic, enhancing security by offering services such as intrusion prevention, application layer filtering, and antivirus scanning. This allows security monitoring of the encapsulated traffic at higher layers of the OSI model (Layers 4-7), which is essential for advanced threat detection.

Security in the Overlay Network (Answer C): The SRX adds security by functioning as an enterprise-grade firewall within the EVPN-VXLAN overlay. This means that traffic flowing between virtualized segments or networks can be inspected and filtered using SRX firewall rules, ensuring that the VXLAN overlay remains secure.

These features make the SRX a powerful addition for securing EVPN-VXLAN environments, providing comprehensive security for encapsulated traffic and ensuring that both the underlay and overlay networks are protected.

Total 115 questions
Go to page: of 12