Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Juniper JN0-231 Security-Associate (JNCIA-SEC) Exam Practice Test

Page: 1 / 10
Total 101 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which Web filtering solution uses a direct Internet-based service for URL categorization?

Options:

A.

Juniper ATP Cloud

B.

Websense Redirect

C.

Juniper Enhanced Web Filtering

D.

local blocklist

Question 2

Which security policy type will be evaluated first?

Options:

A.

A zone policy with no dynamic application set

B.

A global with no dynamic application set

C.

A zone policy with a dynamic application set

D.

A global policy with a dynamic application set

Question 3

When configuring antispam, where do you apply any local lists that are configured?

Options:

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Question 4

What is the order of the first path packet processing when a packet enters a device?

Options:

A.

security policies –> screens –> zones

B.

screens –> security policies –> zones

C.

screens –> zones –> security policies

D.

security policies –> zones –> screens

Question 5

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

Options:

A.

integrated user firewall

B.

screens

C.

802.1X

D.

Juniper ATP

Question 6

Which three Web filtering deployment actions are supported by Junos? (Choose three.)

Options:

A.

Use IPS.

B.

Use local lists.

C.

Use remote lists.

D.

Use Websense Redirect.

E.

Use Juniper Enhanced Web Filtering.

Question 7

You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution.

Which solution satisfies the requirement?

Options:

A.

Juniper Sky Enterprise

B.

J-Web

C.

Junos Secure Connect

D.

Junos Space

Question 8

Which two statements are correct about global policies? (Choose two.)

Options:

A.

Global policies are evaluated after default policies.

B.

Global policies do not have to reference zone context.

C.

Global policies are evaluated before default policies.

D.

Global policies must reference zone contexts.

Question 9

Click the Exhibit button.

You are asked to allow only ping and SSH access to the security policies shown in the exhibit.

Which statement will accomplish this task?

Options:

A.

Rename policy Rule-2 to policy Rule-0.

B.

Insert policy Rule-2 before policy Rule-1.

C.

Replace application any with application [junos-ping junos-ssh] in policy Rule-1.

D.

Rename policy Rule-1 to policy Rule-3.

Question 10

Click the Exhibit button.

Referring to the exhibit, a user is placed in which hierarchy when the exit command is run?

Options:

A.

[edit security policies from-zone trust to-zone dmz]

user@vSRX-1#

B.

[edit]

user@vSRX-1#

C.

[edit security policies]

user@vSRX-1#

D.

user@vSRX-1>

Question 11

You are installing a new SRX Series device and you are only provided one IP address from your ISP.

In this scenario, which NAT solution would you implement?

Options:

A.

pool-based NAT with PAT

B.

pool-based NAT with address shifting

C.

interface-based source NAT

D.

pool-based NAT without PAT

Question 12

Which statement is correct about global security policies on SRX Series devices?

Options:

A.

The to-zone any command configures a global policy.

B.

The from-zone any command configures a global policy.

C.

Global policies are always evaluated first.

D.

Global policies can include zone context.

Question 13

In J-Web. the management and loopback address configuration option allows you to configure which area?

Options:

A.

the IP address of the primary Gigabit Ethernet port

B.

the IP address of the Network Time Protocol server

C.

the CIDR address

D.

the IP address of the device management port

Question 14

You are creating Ipsec connections.

In this scenario, which two statements are correct about proxy IDs? (Choose two.)

Options:

A.

Proxy IDs are used to configure traffic selectors.

B.

Proxy IDs are optional for Phase 2 session establishment.

C.

Proxy IDs must match for Phase 2 session establishment.

D.

Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.

Question 15

Which two components are part of a security zone? (Choose two.)

Options:

A.

inet.0

B.

fxp0

C.

address book

D.

ge-0/0/0.0

Page: 1 / 10
Total 101 questions