New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Juniper JN0-637 Security, Professional (JNCIP-SEC) Exam Practice Test

Page: 1 / 12
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What are three attributes that APBR queries from the application system cache module. (Choose Three)

Options:

A.

TTL

B.

destination port

C.

service

D.

DSCP

E.

protocol type

Question 2

Exhibit:

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Hosts in the Local zone can be enabled for control plane access to the SRX.

B.

An IRB interface is required to enable communication between the Trust and the Untrust zones.

C.

You can configure security policies for traffic flows between hosts in the Local zone.

D.

Hosts in the Local zone can communicate with hosts in the Trust zone with a security policy.

Question 3

Exhibit:

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

You cannot secure intra-VLAN traffic with a security policy on this device.

B.

You can secure inter-VLAN traffic with a security policy on this device.

C.

The device can pass Layer 2 and Layer 3 traffic at the same time.

D.

The device cannot pass Layer 2 and Layer 3 traffic at the same time.

Question 4

Exhibit:

The Ipsec VPN does not establish when the peer initiates, but it does establish when the SRX

series device initiates. Referring to the exhibit, what will solve this problem?

Options:

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

B.

The screen configuration on the untrust zone needs to be modified.

C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

D.

Application tracking on the untrust zone needs to be removed.

Question 5

You are asked to configure tenant systems.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

A tenant system can have only one administrator.

B.

After successful configuration, the changes are merged into the primary database for each tenant system.

C.

Tenant systems have their own configuration database.

D.

You can commit multiple tenant systems at a time.

Question 6

You want to enable transparent mode on your SRX series device.

In this scenario, which three actions should you perform? (Choose three.)

Options:

A.

Enable the ethernet-switching family on your Layer 2 interfaces

B.

Install a Layer 2 feature license.

C.

Reboot the SRX device.

D.

Ensure that no IRB interfaces are configured on the device.

E.

Add your Layer 2 interfaces to a security zone.

Question 7

You are configuring an interconnect logical system that is configured as a VPLS switch to allow two logical systems to communicate.

Which two parameters are required when configuring the logical tunnel interfaces? (Choose two.)

Options:

A.

Encapsulation ethernet must be used.

B.

The virtual tunnel interfaces should only be configured with two logical unit pairs per logical system interconnect.

C.

The logical tunnel interfaces should be configured with two logical unit pairs per logical system interconnect.

D.

Encapsulation ethernet-vpls must be used.

Question 8

You are asked to create multiple virtual routers using a single SRX Series device. You must ensure that each virtual router maintains a unique copy of the routing protocol daemon (RPD) process.

Which solution will accomplish this task?

Options:

A.

Secure wire

B.

Tenant system

C.

Transparent mode

D.

Logical system

Question 9

Exhibit:

Referring to the exhibit, which IKE mode will be configured on the HQ-Gateway and Subsidiary-Gateway?

Options:

A.

Main mode on both the gateways

B.

Aggressive mode on both the gateways

C.

Main mode on the HQ-Gateway and aggressive mode on the Subsidiary-Gateway

D.

Aggressive mode on the HQ-Gateway and main mode on the Subsidiary-Gateway

Question 10

You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.

Which product provides this capability?

Options:

A.

Security Director

B.

Network Director

C.

Mist

D.

Security Director Insights

Question 11

Exhibit:

Which two statements are correct about the output shown in the exhibit. (Choose Two)

Options:

A.

The data shown requires a traceoptions flag of basic-datapath.

B.

The data shown requires a traceoptions flag of host-traffic.

C.

The packet is dropped by the default security policy.

D.

The packet is dropped by a configured security policy.

Question 12

Which two statements describe the behavior of logical systems? (Choose two.)

Options:

A.

Each logical system shares the routing protocol process.

B.

A default routing instance must be manually created for each logical system

C.

Each logical system has a copy of the routing protocol process.

D.

A default routing instance is automatically created for each logical system.

Question 13

Your customer needs embedded security in an EVPN-VXLAN solution.

What are two benefits of adding an SRX Series device in this scenario? (Choose two.)

Options:

A.

It enhances tunnel inspection for VXLAN encapsulated traffic with Layer 4-7 security services.

B.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN underlay.

C.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN overlay.

D.

It enhances tunnel inspection for VXLAN encapsulated traffic with only Layer 4 security services.

Question 14

You are deploying IPsec VPNs to securely connect several enterprise sites with ospf for dynamic

routing. Some of these sites are secured by third-party devices not running Junos.

Which two statements are true for this deployment? (Choose two.)

Options:

A.

OSPF over IPsec can be used for intersite dynamic routing.

B.

Sites with overlapping address spaces can be supported.

C.

OSPF over GRE over IPsec is required to enable intersite dynamic routing

D.

Sites with overlapping address spaces cannot be supported.

Question 15

Which role does an SRX Series device play in a DS-Lite deployment?

Options:

A.

Softwire concentrator

B.

STUN server

C.

STUN client

D.

Softwire initiator

Question 16

A customer wants to be able to initiate a return connection to an internal host from a specific

Server.

Which NAT feature would you use in this scenario?

Options:

A.

target-host

B.

any-remote-host

C.

port-overloading

D.

target-server

Question 17

The SRX series device is performing static NAT. you want to ensure that host A can reach the

internal webserver using domain name.

Referring to the exhibit, which two Junos features are required to accomplish this task? (Choose two.)

Options:

A.

DNS doctoring

B.

proxy ARP

C.

persistent NAT

D.

STUN

Question 18

You need to set up source NAT so that external hosts can initiate connections to an internal device, but only if a connection to the device was first initiated by the internal device.

Which type of NAT solution provides this functionality?

Options:

A.

Address persistence

B.

Persistent NAT with any remote host

C.

Persistent NAT with target host

D.

Static NAT

Question 19

Which two statements are true when setting up an SRX Series device to operate in mixed mode? (Choose two.)

Options:

A.

A physical interface can be configured to be both a Layer 2 and a Layer 3 interface at the same time.

B.

User logical systems support Layer 2 traffic processing.

C.

The SRX must be rebooted after configuring at least one Layer 3 and one Layer 2 interface.

D.

Packets from Layer 2 interfaces are switched within the same bridge domain.

Question 20

Exhibit:

Referring to the flow logs exhibit, which two statements are correct? (Choose two.)

Options:

A.

The packet is dropped by the default security policy.

B.

The packet is dropped by a configured security policy.

C.

The data shown requires a traceoptions flag of host-traffic.

D.

The data shown requires a traceoptions flag of basic-datapath.

Question 21

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This device is the backup node for SRG1.

B.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are not active and will not respond to ARP requests to the virtual IP MAC address.

C.

This device is the active node for SRG1.

D.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are active and will respond to ARP requests to the virtual IP MAC address.

Question 22

You configure two Ethernet interfaces on your SRX Series device as Layer 2 interfaces and add them to the same VLAN. The SRX is using the default L2-learning setting. You do not add the interfaces to a security zone.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You are unable to apply stateful security features to traffic that is switched between the two interfaces.

B.

You are able to apply stateful security features to traffic that enters and exits the VLAN.

C.

The interfaces will not forward traffic by default.

D.

You cannot add Layer 2 interfaces to a security zone.

Question 23

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

Options:

A.

IDP disable is not configured on the APBR rule.

B.

The application services bypass is not configured on the APBR rule.

C.

The APBR rule does a match on the first packet.

D.

The session did not properly reclassify midstream to the correct APBR rule.

Question 24

You want to configure the SRX Series device to map two peer interfaces together and ensure that there is no switching or routing lookup to forward traffic.

Which feature on the SRX Series device is used to accomplish this task?

Options:

A.

Transparent mode

B.

Secure wire

C.

Mixed mode

D.

Switching mode

Question 25

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

You cannot secure intra-VLAN traffic with a security policy on this device.

B.

You can secure inter-VLAN traffic with a security policy on this device.

C.

The device can pass Layer 2 and Layer 3 traffic at the same time.

D.

The device cannot pass Layer 2 and Layer 3 traffic at the same time.

Question 26

Click the Exhibit button.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The traffic is permitted.

B.

The traffic was initiated by the 10.10.102.10 address.

C.

The destination device is not responding.

D.

The traffic is denied.

Question 27

Exhibit:

You are troubleshooting a new IPsec VPN that is configured between your corporate office and the RemoteSite1 SRX Series device. The VPN is not currently establishing. The RemoteSite1 device is being assigned an IP address on its gateway interface using DHCP.

Which action will solve this problem?

Options:

A.

On the RemoteSite1 device, change the IKE gateway external interface to st0.0.

B.

On both devices, change the IKE version to use version 2 only.

C.

On both devices, change the IKE policy proposal set to basic.

D.

On both devices, change the IKE policy mode to aggressive.

Question 28

You are asked to see if your persistent NAT binding table is exhausted.

Which show command would you use to accomplish this task?

Options:

A.

show security nat source persistent-nat-table summary

B.

show security nat source summary

C.

show security nat source pool all

D.

show security nat source persistent-nat-table all

Question 29

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

Options:

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

C.

One security profile can only be applied to one logical system.

D.

One security profile can be applied to multiple logical systems.

Question 30

Exhibit:

Host A shown in the exhibit is attempting to reach the Web1 webserver, but the connection is failing. Troubleshooting reveals that when Host A attempts to resolve the domain name of the server (web.acme.com), the request is resolved to the private address of the server rather than its public IP.

Which feature would you configure on the SRX Series device to solve this issue?

Options:

A.

Persistent NAT

B.

Double NAT

C.

DNS doctoring

D.

STUN protocol

Question 31

Which encapsulation type must be configured on the lt-0/0/0 logical units for an interconnect

logical systems VPLS switch?

Options:

A.

encapsulation ethernet-bridge

B.

encapsulation ethernet

C.

encapsulation ethernet-vpls

D.

encapsulation vlan-vpls

Question 32

Which two statements are true about the procedures the Junos security device uses when handling traffic destined for the device itself? (Choose two.)

Options:

A.

If the received packet is addressed to the ingress interface, then the device first performs a security policy evaluation for the junos-host zone.

B.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation for the junos-host zone.

C.

If the received packet is addressed to the ingress interface, then the device first examines the host-inbound-traffic configuration for the ingress interface and zone.

D.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation based on the ingress and egress zone.

Question 33

The exhibit shows part of the flow session logs.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

The existing session is found in the table, and the fast path process begins.

B.

This packet arrives on interface ge-0/0/4.0.

C.

Junos captures a TCP packet from source address 172.20.101.10 destined to 10.0.1.129.

D.

Destination NAT occurs.

Question 34

Which two statements are correct about the ICL in an active/active mode multinode HA environment? (Choose two.)

Options:

A.

The ICL is strictly a Layer 2 interface.

B.

The ICL uses a separate routing instance to communicate with remote multinode HA peers.

C.

The ICL traffic can be encrypted.

D.

The ICL is the local device management interface in a multinode HA environment.

Page: 1 / 12
Total 115 questions