ExamGecko
Home Home / Juniper / JN0-637

Juniper JN0-637 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Which two elements are necessary to configure a rule under an APBR profile? (Choose Two)

A.

instance type

A.

instance type

Answers
B.

match condition

B.

match condition

Answers
C.

then action

C.

then action

Answers
D.

RIB group

D.

RIB group

Answers
E.

RIB group: RIB groups are used for route management and are not directly involved in APBR rule configuration.

E.

RIB group: RIB groups are used for route management and are not directly involved in APBR rule configuration.

Answers
Suggested answer: B, C

Explanation:

Here's why those elements are necessary for configuring a rule under an APBR profile:

B . Match condition: This defines the criteria for matching traffic to the APBR rule. It can include:

Applications: Match based on specific applications or application groups.

URL categories: Match based on URL categories provided by a web filtering service.

Other criteria: You can also match based on source/destination IP addresses, ports, protocols, etc.

C . Then action: This specifies the action to take when traffic matches the rule. The primary action in APBR is:

routing-instance: This redirects the matching traffic to a specific routing instance, allowing you to steer traffic through different paths based on the application or URL category.

Why other options are incorrect:

A . Instance type: While routing instances are used in APBR, the 'instance type' itself is not configured within the APBR rule. You define the instance type separately when configuring the routing instance.

Referring to the exhibit, you are attempting to set up a remote access VPN on your SRX series devices.

However you are unsure of which system services you should allow and in which zones they should be allowed to correctly finish the remote access VPN configuration

Which two statements are correct? (Choose two.)

A.

You should add the host-inbound-traffic system-service ike statement to the Untrust zone.

A.

You should add the host-inbound-traffic system-service ike statement to the Untrust zone.

Answers
B.

You should add the host-inbound-traffic system-service ike statement to the VPN zone.

B.

You should add the host-inbound-traffic system-service ike statement to the VPN zone.

Answers
C.

You should add the host-inbound-traffic system-service tcp-encap statement to the Untrust zone

C.

You should add the host-inbound-traffic system-service tcp-encap statement to the Untrust zone

Answers
D.

You should add the host-inbound-traffic system-service tcp-encap statement to the VPN zone

D.

You should add the host-inbound-traffic system-service tcp-encap statement to the VPN zone

Answers
Suggested answer: A, C

What are three configurable monitor components for a service redundancy group? (Choose two)

A.

Interface

A.

Interface

Answers
B.

BFD

B.

BFD

Answers
C.

hardware alarm

C.

hardware alarm

Answers
D.

IP

D.

IP

Answers
E.

ARP

E.

ARP

Answers
Suggested answer: A, D, E

The SRX series device is performing static NAT. you want to ensure that host A can reach the

internal webserver www.juniper.net using domain name.

Referring to the exhibit, which two Junos features are required to accomplish this task? (Choose two.)

A.

DNS doctoring

A.

DNS doctoring

Answers
B.

proxy ARP

B.

proxy ARP

Answers
C.

persistent NAT

C.

persistent NAT

Answers
D.

STUN

D.

STUN

Answers
Suggested answer: A, B

You want to enable transparent mode on your SRX series device.

In this scenario, which three actions should you perform? (Choose three.)

A.

Enable the ethernet-switching family on your Layer 2 interfaces

A.

Enable the ethernet-switching family on your Layer 2 interfaces

Answers
B.

Install a Layer 2 feature license.

B.

Install a Layer 2 feature license.

Answers
C.

Reboot the SRX device.

C.

Reboot the SRX device.

Answers
D.

Ensure that no IRB interfaces are configured on the device.

D.

Ensure that no IRB interfaces are configured on the device.

Answers
E.

Add your Layer 2 interfaces to a security zone.

E.

Add your Layer 2 interfaces to a security zone.

Answers
Suggested answer: A, C, E

Referring to the exhibit, you have been assigned the user LogicalSYS1 credentials shown in

the configuration.

In this scenario, which two statements are correct? (Choose two.)

A.

When you log in to the device, you will be permitted to view all routing tables available on the SRX device

A.

When you log in to the device, you will be permitted to view all routing tables available on the SRX device

Answers
B.

When you log in to the device, you will be permitted to view only the routing tables for Logic

B.

When you log in to the device, you will be permitted to view only the routing tables for Logic

Answers
C.

When you log in to the device, you will be located at the operational mode of the Logic

C.

When you log in to the device, you will be located at the operational mode of the Logic

Answers
D.

When you log in to the device, you will be located at the operational mode of the main system

D.

When you log in to the device, you will be located at the operational mode of the main system

Answers
Suggested answer: B, C

Exhibit:

You created a Unified security policy called test on the network edge srx series firewall.

According to the firewall, this new security policy is not passing traffic.

Which two statements are correct in this scenario? (Choose two.)

A.

The test policy should be the last policy.

A.

The test policy should be the last policy.

Answers
B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

Answers
C.

The source address cannot be any when a dynamic application is configured.

C.

The source address cannot be any when a dynamic application is configured.

Answers
D.

The drop-http policy is a terminating rule and will drop the traffic.

D.

The drop-http policy is a terminating rule and will drop the traffic.

Answers
Suggested answer: B, D

Exhibit:

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

A.

DS-Lite

A.

DS-Lite

Answers
B.

NAT444

B.

NAT444

Answers
C.

NAT46

C.

NAT46

Answers
D.

full cone NAT

D.

full cone NAT

Answers
Suggested answer: A

You are attempting to ping the IP address that is assigned to the loopback interface on the

SRX series device shown in the exhibit.

What is causing this problem?

A.

The loopback interface requires encapsulation.

A.

The loopback interface requires encapsulation.

Answers
B.

The loopback interface is not assigned to a security zone.

B.

The loopback interface is not assigned to a security zone.

Answers
C.

The incorrect interface index ID is assigned to the loopback interface.

C.

The incorrect interface index ID is assigned to the loopback interface.

Answers
D.

The IP address on the loopback interface is a private address.

D.

The IP address on the loopback interface is a private address.

Answers
Suggested answer: C

What are three requirements to run OSPF over GRE over IPsec? (Choose Three)

A.

The GRE interface must be configured in OSPF Area 0.

A.

The GRE interface must be configured in OSPF Area 0.

Answers
B.

The OSPF interface must be placed in a zone and must have GRE configured

B.

The OSPF interface must be placed in a zone and must have GRE configured

Answers
C.

Overlapping addresses should exist between remote networks.

C.

Overlapping addresses should exist between remote networks.

Answers
D.

The GRE interface must be placed in a zone and must have OSPF configured in is host

D.

The GRE interface must be placed in a zone and must have OSPF configured in is host

Answers
E.

Overlapping addresses should not exist between remote networks.

E.

Overlapping addresses should not exist between remote networks.

Answers
Suggested answer: B, D, E
Total 115 questions
Go to page: of 12