ExamGecko
Question list
Search
Search

List of questions

Search

Question 28 - JN0-637 discussion

Report
Export

You want to test how the device handles a theoretical session without generating traffic on the Junos security device.

Which command is used in this scenario?

A.

request security policies check

Answers
A.

request security policies check

B.

show security flow session

Answers
B.

show security flow session

C.

show security match-policies

Answers
C.

show security match-policies

D.

show security policies

Answers
D.

show security policies

Suggested answer: A

Explanation:

The request security policies check command allows you to simulate a session through the SRX device, checking the security policy action that would apply without needing to send real traffic. This helps in validating configurations before actual deployment. For more details, see Juniper Security Policies Testing.

The command request security policies check is used to test how a Junos security device handles a theoretical session without generating actual traffic. This command is useful for validating how security policies would be applied to a session based on various parameters like source and destination addresses, application type, and more.

Explanation of Answer A (request security policies check):

This command allows you to simulate a session and verify which security policies would be applied to the session. It's a proactive method to test security policy configurations without the need to generate real traffic.

Example usage:

bash

request security policies check from-zone trust to-zone untrust source 10.1.1.1 destination 192.168.1.1 protocol tcp application junos-https

Juniper Security

Reference:

Security Policies Check: This command provides a way to simulate and verify security policy behavior without actual traffic. Reference: Juniper Security Policy Documentation.

asked 01/11/2024
sujan bolla
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first