Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Juniper JN0-335 Security, Specialist (JNCIS-SEC) Exam Practice Test

Page: 1 / 10
Total 98 questions

Security, Specialist (JNCIS-SEC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Exhibit

Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?

Options:

A.

Forwarding Lookup

B.

Services ALGs

C.

Security Policy

D.

Screens

Question 2

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

Options:

A.

Enable AppQoS on the proper security zones

B.

Enable APBR on the proper security zones

C.

Enable screen options on the proper security zones

D.

Enable AppTrack on the proper security zones.

Question 3

Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)

Options:

A.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are maintained

B.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are dropped.

C.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are dropped.

D.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are reevaluated.

Question 4

Which two statements are correct about a reth LAG? (Choose two.)

Options:

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Question 5

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.

How do you solve this problem?

Options:

A.

Load a known good, but expired. CA certificate onto the SRX Series device.

B.

Install a new SRX Series device to act as the client proxy

C.

Reboot the SRX Series device.

D.

Import the existing certificate to each client device.

Question 6

Regarding static attack object groups, which two statements are true? (Choose two.)

Options:

A.

Matching attack objects are automatically added to a custom group.

B.

Group membership automatically changes when Juniper updates the IPS signature database.

C.

Group membership does not automatically change when Juniper updates the IPS signature database.

D.

You must manually add matching attack objects to a custom group.

Question 7

You need to deploy an SRX Series device in your virtual environment.

In this scenario, what are two benefits of using a CSRX? (Choose two.)

Options:

A.

The cSRX supports Layer 2 and Layer 3 deployments.

B.

The cSRX default configuration contains three default zones: trust, untrust, and management.

C.

The cSRX supports firewall, NAT, IPS, and UTM services.

D.

The cSRX has low memory requirements.

Question 8

Options:

A.

IPS is integrated as a security service on SRX Series devices.

B.

IPS uses sandboxinQ to detect unknown attacks.

C.

IPS is a standalone platform running on dedicated hardware or as a virtual device.

D.

IPS uses protocol anomaly rules to detect unknown attacks.

Question 9

Which two statements about SRX chassis clustering are correct? (Choose two.)

Options:

A.

SRX chassis clustering supports active/passive and active/active for the data plane.

B.

SRX chassis clustering only supports active/passive for the data plane.

C.

SRX chassis clustering supports active/passive for the control plane.

D.

SRX chassis clustering supports active/active for the control plane.

Question 10

Which two statements are true about application identification? (Choose two.)

Options:

A.

Application identification can identity nested applications that are within Layer 7.

B.

Application identification cannot identify nested applications that are within Layer 7.

C.

Application signatures are the same as IDP signatures.

D.

Application signatures are not the same as IDP signatures.

Question 11

Which two statements are correct about SSL proxy server protection? (Choose two.)

Options:

A.

You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.

B.

You must load the server certificates on the SRX Series device.

C.

The servers must be configured to use the SSL proxy function on the SRX Series device.

D.

You must import the root CA on the servers.

Question 12

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Dynamic analysis is always performed to determine if a file contains malware.

B.

If the cache lookup determines that a file contains malware, performed to verify the results.

C.

Dynamic analysis is not always necessary to determine if a file contains malware.

D.

If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results.

Question 13

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

Options:

A.

Juniper ATP Cloud allows the creation of allowlists.

B.

Juniper ATP Cloud uses a single antivirus software package to analyze files.

C.

Juniper ATP Cloud allows end users to bypass the inspection of files.

D.

Juniper ATP Cloud performs a cache lookup on files.

Question 15

After JSA receives external events and flows, which two steps occur? (Choose two.)

Options:

A.

After formatting the data, the data is stored in an asset database.

B.

Before formatting the data, the data is analyzed for relevant information.

C.

Before the information is filtered, the information is formatted

D.

After the information is filtered, JSA responds with active measures

Question 16

Exhibit

Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

Options:

A.

The session-class parameter in only used when troubleshooting.

B.

The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.

C.

Every session that enters the SRX Series device will generate an event

D.

Replacing the session-init parameter with session-lose will log unidentified flows.

Question 17

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

Options:

A.

AppTrack

B.

AppQoS

C.

AppFW

D.

APPID

Question 18

What are two requirements for enabling AppQoE? (Choose two.)

Options:

A.

You need two SRX Series device endpoints.

B.

You need two SRX Series or MX Series device endpoints.

C.

You need an APPID feature license.

D.

You need to configure AppQoE for reverse traffic.

Question 19

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

Options:

A.

It decrypts the file in a sandbox.

B.

It validates the certificates used.

C.

It decrypts the data to validate the hash.

D.

It reviews the timing and frequency of the connections.

Question 20

Exhibit

Using the information from the exhibit, which statement is correct?

Options:

A.

Redundancy group 1 is in an ineligible state.

B.

Node1 is the active node for the control plane

C.

There are no issues with the cluster.

D.

Redundancy group 0 is in an ineligible state.

Question 21

You are asked to block malicious applications regardless of the port number being used.

In this scenario, which two application security features should be used? (Choose two.)

Options:

A.

AppFW

B.

AppQoE

C.

APPID

D.

AppTrack

Question 22

You are configuring logging for a security policy.

In this scenario, in which two situations would log entries be generated? (Choose two.)

Options:

A.

every 10 minutes

B.

at session initialization

C.

every 60 seconds

D.

at session close

Question 23

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.

Download the IPS signature database.

B.

Enroll the SRX Series device with Juniper ATP Cloud.

C.

Install the IPS signature database.

D.

Reboot the SRX Series device.

Question 24

Your manager asks you to provide firewall and NAT services in a private cloud.

Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

Options:

A.

a single vSRX

B.

a vSRX for firewall services and a separate vSRX for NAT services

C.

a cSRX for firewall services and a separate cSRX for NAT services

D.

a single cSRX

Question 25

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.

Adaptive Threat Profiling

B.

Juniper Secure Analytics

C.

Juniper Identity Management Service

D.

Intrusion Prevention System

Question 26

What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?

Options:

A.

certificates

B.

dynamic address groups

C.

MAC addresses

D.

domain names

Question 27

You administer a JSA host and want to include a rule that sets a threshold for excessive firewall denies and sends an SNMP trap after receiving related syslog messages from an SRX Series firewall.

Which JSA rule type satisfies this requirement?

Options:

A.

common

B.

offense

C.

flow

D.

event

Question 28

Which two statements are correct about Juniper ATP Cloud? (Choose two.)

Options:

A.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.

B.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats levels range from 0 to 10 minutes.

C.

The threat levels range from 0-10.

D.

The threat levels range from 0-100.

Question 29

Exhibit

Referring to the exhibit which statement is true?

Options:

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Page: 1 / 10
Total 98 questions