ExamGecko
Home Home / Juniper / JN0-637

Juniper JN0-637 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

Answers
B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

Answers
C.

One security profile can only be applied to one logical system.

C.

One security profile can only be applied to one logical system.

Answers
D.

One security profile can be applied to multiple logical systems.

D.

One security profile can be applied to multiple logical systems.

Answers
Suggested answer: B, D

Explanation:

When using security profiles to limit system resources in Juniper logical systems:

No Resource Specification (Answer B): If a resource limit is not specified for a logical system, no specific amount of system resources is reserved for it. Instead, the logical system competes for resources along with others in the system, up to the maximum available. This allows flexible resource allocation, where logical systems can scale based on actual demand rather than predefined limits.

Multiple Logical Systems per Security Profile (Answer D): A single security profile can be applied to multiple logical systems. This allows administrators to define resource limits once in a profile and apply it across several logical systems, simplifying management and ensuring consistency across different environments.

These principles ensure efficient and flexible use of system resources within a multi-tenant or multi-logical-system environment.

You are asked to configure tenant systems.

Which two statements are true in this scenario? (Choose two.)

A.

A tenant system can have only one administrator.

A.

A tenant system can have only one administrator.

Answers
B.

After successful configuration, the changes are merged into the primary database for each tenant system.

B.

After successful configuration, the changes are merged into the primary database for each tenant system.

Answers
C.

Tenant systems have their own configuration database.

C.

Tenant systems have their own configuration database.

Answers
D.

You can commit multiple tenant systems at a time.

D.

You can commit multiple tenant systems at a time.

Answers
Suggested answer: C, D

Explanation:

Each tenant system maintains its own configuration database, isolating configurations from others, enhancing security and operational efficiency. Junos OS supports multiple concurrent commit operations across tenant systems. Further details are covered in the Juniper Tenant System Guide.

When configuring tenant systems on an SRX device, the following principles apply:

Tenant Systems Have Their Own Configuration Database (Answer C): Each tenant system has its own isolated configuration database, ensuring that changes made in one tenant system do not affect others. This allows for multi-tenant environments where different tenants can have independent configurations.

Commit Multiple Tenant Systems Simultaneously (Answer D): The system allows for multiple tenant systems to be committed at the same time, simplifying management when working with multiple tenants. This is particularly useful in large environments where multiple logical systems or tenants need updates simultaneously.

You are deploying a large-scale VPN spanning six sites. You need to choose a VPN technology that satisfies the following requirements:

All sites must have secure reachability to all other sites.

New spoke sites can be added without explicit configuration on the hub site.

All spoke-to-spoke communication must traverse the hub site.

Which VPN technology will satisfy these requirements?

A.

ADVPN

A.

ADVPN

Answers
B.

Group VPN

B.

Group VPN

Answers
C.

Secure Connect VPN

C.

Secure Connect VPN

Answers
D.

AutoVPN

D.

AutoVPN

Answers
Suggested answer: D

Explanation:

AutoVPN simplifies deployment by dynamically establishing tunnels from spokes to the hub. This architecture supports easy scaling with minimal configuration changes, ensuring spoke-to-spoke traffic flows through the hub. For more information, see Juniper AutoVPN Overview.

In this scenario, you need a VPN solution that ensures secure, dynamic connectivity between multiple sites, with the following conditions:

All sites must have secure reachability.

New spoke sites can be added without explicit configuration on the hub site.

Spoke-to-spoke communication must traverse the hub.

The correct technology to meet these requirements is AutoVPN. It simplifies VPN configurations by automating the setup between hub and spoke sites. Additionally, AutoVPN automatically establishes secure tunnels for new spoke sites without requiring manual configuration at the hub, and all spoke-to-spoke traffic is routed through the hub.

You need to set up source NAT so that external hosts can initiate connections to an internal device, but only if a connection to the device was first initiated by the internal device.

Which type of NAT solution provides this functionality?

A.

Address persistence

A.

Address persistence

Answers
B.

Persistent NAT with any remote host

B.

Persistent NAT with any remote host

Answers
C.

Persistent NAT with target host

C.

Persistent NAT with target host

Answers
D.

Static NAT

D.

Static NAT

Answers
Suggested answer: C

Explanation:

Persistent NAT with target host allows external hosts to establish connections only when the internal device initiates a session first, ideal for specific interactive applications. Refer to Juniper Persistent NAT Documentation.

The scenario requires that external hosts be able to initiate a connection only if the internal device has already initiated a connection. The correct solution is Persistent NAT with target host, which ensures that a specific external host can initiate new connections back to the internal device, but only after the internal device has established a session first.

Persistent NAT with Target Host (Answer C): This allows the internal device to initiate a connection, and once established, the specified external host can also initiate new connections to the internal device on the same NAT mapping.

Example Configuration:

bash

set security nat source persistent-nat permit target-host-port

This solution is appropriate when controlled bidirectional communication is required based on an internal-initiated connection.

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

Infected hosts are tracked by their IP address.

A.

Infected hosts are tracked by their IP address.

Answers
B.

Infected hosts are tracked by their chassis serial number.

B.

Infected hosts are tracked by their chassis serial number.

Answers
C.

Infected hosts are tracked by their MAC address.

C.

Infected hosts are tracked by their MAC address.

Answers
D.

Infected hosts are tracked by their user identity.

D.

Infected hosts are tracked by their user identity.

Answers
Suggested answer: A, C

You have deployed two SRX Series devices in an active/passive multimode HA scenario.

In this scenario, which two statements are correct? (Choose two.)

A.

Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.

A.

Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.

Answers
B.

Services redundancy group 0 (SRG0) is used for services that have a control plane state.

B.

Services redundancy group 0 (SRG0) is used for services that have a control plane state.

Answers
C.

Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.

C.

Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.

Answers
D.

Services redundancy group 1 (SRG1) is used for services that have a control plane state.

D.

Services redundancy group 1 (SRG1) is used for services that have a control plane state.

Answers
Suggested answer: C, D

Which two statements are true regarding NAT64? (Choose two.)

A.

An SRX Series device should be in packet-based forwarding mode for IPv4.

A.

An SRX Series device should be in packet-based forwarding mode for IPv4.

Answers
B.

An SRX Series device should be in packet-based forwarding mode for IPv6.

B.

An SRX Series device should be in packet-based forwarding mode for IPv6.

Answers
C.

An SRX Series device should be in flow-based forwarding mode for IPv4.

C.

An SRX Series device should be in flow-based forwarding mode for IPv4.

Answers
D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Answers
Suggested answer: B, C

What is the advantage of using separate st0 logical units for each spoke connection?

A.

It is easy to configure even when managing many st0 units.

A.

It is easy to configure even when managing many st0 units.

Answers
B.

It facilitates scalability.

B.

It facilitates scalability.

Answers
C.

Junos devices can exchange NHTB data automatically using this method.

C.

Junos devices can exchange NHTB data automatically using this method.

Answers
D.

It enables assignments of different settings to each logical unit.

D.

It enables assignments of different settings to each logical unit.

Answers
Suggested answer: D

You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.

Which product provides this capability?

A.

Security Director

A.

Security Director

Answers
B.

Network Director

B.

Network Director

Answers
C.

Mist

C.

Mist

Answers
D.

Security Director Insights

D.

Security Director Insights

Answers
Suggested answer: C

You are asked to establish IBGP between two nodes, but the session is not established. To troubleshoot this problem, you configured trace options to monitor BGP protocol message exchanges.

Referring to the exhibit, which action would solve the problem?

A.

Add the junos-host zone policy to permit the BGP packets.

A.

Add the junos-host zone policy to permit the BGP packets.

Answers
B.

Add a firewall filter to lo0 that permits the BGP packets.

B.

Add a firewall filter to lo0 that permits the BGP packets.

Answers
C.

Modify the security policy to permit the BGP packets.

C.

Modify the security policy to permit the BGP packets.

Answers
D.

Add BGP to the lo0 host-inbound-traffic configuration.

D.

Add BGP to the lo0 host-inbound-traffic configuration.

Answers
Suggested answer: D
Total 115 questions
Go to page: of 12