Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Juniper JN0-231 Security-Associate (JNCIA-SEC) Exam Practice Test

Page: 1 / 11
Total 105 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which statement is correct about Web filtering?

Options:

A.

The Juniper Enhanced Web Filtering solution requires a locally managed server.

B.

The decision to permit or deny is based on the body content of an HTTP packet.

C.

The decision to permit or deny is based on the category to which a URL belongs.

D.

The client can receive an e-mail notification when traffic is blocked.

Question 2

Which two statements are correct about IPsec security associations? (Choose two.)

Options:

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Question 3

You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution.

Which solution satisfies the requirement?

Options:

A.

Juniper Sky Enterprise

B.

J-Web

C.

Junos Secure Connect

D.

Junos Space

Question 4

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

Options:

A.

traffic selector

B.

perfect forward secrecy

C.

st0 interfaces

D.

proxy ID

Question 5

Which Web filtering solution uses a direct Internet-based service for URL categorization?

Options:

A.

Juniper ATP Cloud

B.

Websense Redirect

C.

Juniper Enhanced Web Filtering

D.

local blocklist

Question 6

What is the order of the first path packet processing when a packet enters a device?

Options:

A.

security policies –> screens –> zones

B.

screens –> security policies –> zones

C.

screens –> zones –> security policies

D.

security policies –> zones –> screens

Question 7

A security zone is configured with the source IP address 192.168.0.12/255.255.0.255 wildcard match.

In this scenario, which two IP packets will match the criteria? (Choose two.)

Options:

A.

192.168.1.21

B.

192.168.0.1

C.

192.168.1.12

D.

192.168.22.12

Question 8

Which three Web filtering deployment actions are supported by Junos? (Choose three.)

Options:

A.

Use IPS.

B.

Use local lists.

C.

Use remote lists.

D.

Use Websense Redirect.

E.

Use Juniper Enhanced Web Filtering.

Question 9

Which two statements are correct about global policies? (Choose two.)

Options:

A.

Global policies are evaluated after default policies.

B.

Global policies do not have to reference zone context.

C.

Global policies are evaluated before default policies.

D.

Global policies must reference zone contexts.

Question 10

What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?

Options:

A.

3

B.

4

C.

2

D.

5

Question 11

You have an FTP server and a webserver on the inside of your network that you want to make available to users outside of the network. You are allocated a single public IP address.

In this scenario, which two NAT elements should you configure? (Choose two.)

Options:

A.

destination NAT

B.

NAT pool

C.

source NAT

D.

static NAT

Question 12

When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)

Options:

A.

MPLS

B.

UTM

C.

CoS

D.

IDP

Question 13

What does the number “2” indicate in interface ge-0/1/2?

Options:

A.

the physical interface card (PIC)

B.

the flexible PIC concentrator (FPC)

C.

the interface logical number

D.

the port number

Question 14

What does the number ‘’2’’ indicate in interface ge—0/1/2?

Options:

A.

The interface logical number

B.

The physical interface card (PIC)

C.

The port number

D.

The flexible PIC concentrator (FPC)

Question 15

Which statement is correct about Junos security policies?

Options:

A.

Security policies enforce rules that should be applied to traffic transiting an SRX Series device.

B.

Security policies determine which users are allowed to access an SRX Series device.

C.

Security policies control the flow of internal traffic within an SRX Series device.

D.

Security policies identity groups of users that have access to different features on an SRX Series device.

Question 16

Click the Exhibit button.

What is the purpose of the host-inbound-traffic configuration shown in the exhibit?

Options:

A.

to permit host inbound HTTP traffic and deny all other traffic on the internal security zone

B.

to deny and log all host inbound traffic on the internal security zone, except for HTTP traffic

C.

to permit all host inbound traffic on the internal security zone, but deny HTTP traffic

D.

to permit host inbound HTTP traffic on the internal security zone

Question 17

What is the default value of the dead peer detection (DPD) interval for an IPsec VPN tunnel?

Options:

A.

20 seconds

B.

5 seconds

C.

10 seconds

D.

40 seconds

Question 18

You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.

What information will this command provide? (Choose two.)

Options:

A.

The total active time of the session.

B.

The end-to-end data path that the packets are taking.

C.

The IP address of the host that initiates the session.

D.

The security policy name that is controlling the session.

Question 19

When are Unified Threat Management services performed in a packet flow?

Options:

A.

before security policies are evaluated

B.

as the packet enters an SRX Series device

C.

only during the first path process

D.

after network address translation

Question 20

Which statement about service objects is correct?

Options:

A.

All applications are predefined by Junos.

B.

All applications are custom defined by the administrator.

C.

All applications are either custom or Junos defined.

D.

All applications in service objects are not available on the vSRX Series device.

Question 21

Which two components are part of a security zone? (Choose two.)

Options:

A.

inet.0

B.

fxp0

C.

address book

D.

ge-0/0/0.0

Question 22

What is the correct order in which interface names should be identified?

Options:

A.

system slot number –> interface media type –> port number –> line card slot number

B.

system slot number –> port number –> interface media type –> line card slot number

C.

interface media type –> system slot number –> line card slot number –> port number

D.

interface media type –> port number –> system slot number –> line card slot number

Question 23

You are deploying an SRX Series firewall with multiple NAT scenarios.

In this situation, which NAT scenario takes priority?

Options:

A.

interface NAT

B.

source NAT

C.

static NAT

D.

destination NAT

Question 24

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

Options:

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Question 25

Which statement is correct about global security policies on SRX Series devices?

Options:

A.

The to-zone any command configures a global policy.

B.

The from-zone any command configures a global policy.

C.

Global policies are always evaluated first.

D.

Global policies can include zone context.

Question 26

Which two services does Juniper Connected Security provide? (Choose two.)

Options:

A.

protection against zero-day threats

B.

IPsec VPNs

C.

Layer 2 VPN tunnels

D.

inline malware blocking

Question 27

What is an IP addressing requirement for an IPsec VPN using main mode?

Options:

A.

One peer must have dynamic IP addressing.

B.

One peer must have static IP addressing.

C.

Both peers must have dynamic IP addresses.

D.

Both peers must have static IP addressing.

Question 28

Which two statements are correct about functional zones? (Choose two.)

Options:

A.

Functional zones must have a user-defined name.

B.

Functional zone cannot be referenced in security policies or pass transit traffic.

C.

Multiple types of functional zones can be defined by the user.

D.

Functional zones are used for out-of-band device management.

Question 29

What is the main purpose of using screens on an SRX Series device?

Options:

A.

to provide multiple ports for accessing security zones

B.

to provide an alternative interface into the CLI

C.

to provide protection against common DoS attacks

D.

to provide information about traffic patterns traversing the network

Question 30

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Juniper ATP Cloud is an on-premises ATP appliance.

B.

Juniper ATP Cloud can be used to block and allow IPs.

C.

Juniper ATP Cloud is a cloud-based ATP subscription.

D.

Juniper ATP Cloud delivers intrusion protection services.

Question 31

Which statement about global NAT address persistence is correct?

Options:

A.

The same IP address from a source NAT pool will be assigned for all sessions from a given host.

B.

The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.

C.

The same IP address from a destination NAT pool will be assigned for all sessions for a given host.

D.

The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.

Page: 1 / 11
Total 105 questions