Juniper JN0-637 Practice Test - Questions Answers, Page 6
Related questions
You want to use a security profile to limit the system resources allocated to user logical systems.
In this scenario, which two statements are true? (Choose two.)
If nothing is specified for a resource, a default reserved resource is set for a specific logical system.
If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.
One security profile can only be applied to one logical system.
One security profile can be applied to multiple logical systems.
You are asked to configure tenant systems.
Which two statements are true in this scenario? (Choose two.)
A tenant system can have only one administrator.
After successful configuration, the changes are merged into the primary database for each tenant system.
Tenant systems have their own configuration database.
You can commit multiple tenant systems at a time.
You are deploying a large-scale VPN spanning six sites. You need to choose a VPN technology that satisfies the following requirements:
All sites must have secure reachability to all other sites.
New spoke sites can be added without explicit configuration on the hub site.
All spoke-to-spoke communication must traverse the hub site.
Which VPN technology will satisfy these requirements?
ADVPN
Group VPN
Secure Connect VPN
AutoVPN
You need to set up source NAT so that external hosts can initiate connections to an internal device, but only if a connection to the device was first initiated by the internal device.
Which type of NAT solution provides this functionality?
Address persistence
Persistent NAT with any remote host
Persistent NAT with target host
Static NAT
Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)
Infected hosts are tracked by their IP address.
Infected hosts are tracked by their chassis serial number.
Infected hosts are tracked by their MAC address.
Infected hosts are tracked by their user identity.
You have deployed two SRX Series devices in an active/passive multimode HA scenario.
In this scenario, which two statements are correct? (Choose two.)
Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.
Services redundancy group 0 (SRG0) is used for services that have a control plane state.
Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.
Services redundancy group 1 (SRG1) is used for services that have a control plane state.
Which two statements are true regarding NAT64? (Choose two.)
An SRX Series device should be in packet-based forwarding mode for IPv4.
An SRX Series device should be in packet-based forwarding mode for IPv6.
An SRX Series device should be in flow-based forwarding mode for IPv4.
An SRX Series device should be in flow-based forwarding mode for IPv6.
What is the advantage of using separate st0 logical units for each spoke connection?
It is easy to configure even when managing many st0 units.
It facilitates scalability.
Junos devices can exchange NHTB data automatically using this method.
It enables assignments of different settings to each logical unit.
You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.
Which product provides this capability?
Security Director
Network Director
Mist
Security Director Insights
You are asked to establish IBGP between two nodes, but the session is not established. To troubleshoot this problem, you configured trace options to monitor BGP protocol message exchanges.
Referring to the exhibit, which action would solve the problem?
Add the junos-host zone policy to permit the BGP packets.
Add a firewall filter to lo0 that permits the BGP packets.
Modify the security policy to permit the BGP packets.
Add BGP to the lo0 host-inbound-traffic configuration.
Question