ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 64 - JN0-636 discussion

Report
Export

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

A.
device profile
Answers
A.
device profile
B.
SSL proxy profile
Answers
B.
SSL proxy profile
C.
infected host profile
Answers
C.
infected host profile
D.
C&C profile
Answers
D.
C&C profile
E.
malware profile
Answers
E.
malware profile
Suggested answer: C, D, E

Explanation:

The three profiles that are configurable in a threat prevention policy are infected host profile, C&C profile, and malware profile. A threat prevention policy is a feature of Juniper ATP Cloud that provides protection and monitoring for selected threat profiles, including command and control servers, infected hosts, and malware. Using feeds from Juniper ATP Cloud and optional custom feeds that you configure, ingress and egress traffic is monitored for suspicious content and behavior. Based on a threat score, detected threats are evaluated and action may be taken once a verdict is reached.

You can create a threat prevention policy by selecting one or more of the following profiles:

Infected host profile: This profile detects and blocks traffic from hosts that are infected with malware or compromised by attackers. You can configure the threat score thresholds and the actions for different levels of severity. You can also enable Geo IP filtering to block traffic from or to specific countries or regions.

C&C profile: This profile detects and blocks traffic to or from command and control servers that are used by attackers to control malware or botnets. You can configure the threat score thresholds and the actions for different levels of severity. You can also enable Geo IP filtering to block traffic from or to specific countries or regions.

Malware profile: This profile detects and blocks traffic that contains malware or malicious content.

You can configure the threat score thresholds and the actions for different levels of severity. You can also enable protocol-specific settings for HTTP and SMTP traffic, such as file type filtering, file size filtering, and file name filtering.

The other two profiles, device profile and SSL proxy profile, are not configurable in a threat prevention policy. A device profile is a feature of Policy Enforcer that defines the device type, the device group, and the device settings for the SRX Series devices that are enrolled with Juniper ATP Cloud. An SSL proxy profile is a feature of SRX Series devices that enables SSL proxy to decrypt and inspect SSL/TLS traffic for threats and policy violations.

Reference: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents:

https://www.juniper.net/documentation/en_US/junos-space23.1/policyenforcer/topics/concept/threat-management-policy-overview.html

https://www.juniper.net/documentation/en_US/junos-space23.1/policyenforcer/topics/task/configuration/junos-space-policy-enforcer-threat-management-policyconfigure.

html://https://www.juniper.net/documentation/en_US/junos/topics/concept/securitypolicy-enforcer-device-profile-overview.html

https://www.juniper.net/documentation/en_US/junos/topics/concept/security-ssl-proxyoverview.html

asked 18/09/2024
nosh shah
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first