Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Juniper JN0-335 Security - Specialist (JNCIS-SEC) Exam Practice Test

Page: 1 / 10
Total 98 questions

Security - Specialist (JNCIS-SEC) Questions and Answers

Question 1

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

Options:

A.

It decrypts the file in a sandbox.

B.

It validates the certificates used.

C.

It decrypts the data to validate the hash.

D.

It reviews the timing and frequency of the connections.

Question 2

Click the Exhibit button.

Question # 2

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Question 3

Which two statements about unified security policies are correct? (Choose two.)

Options:

A.

Unified security policies require an advanced feature license.

B.

Unified security policies are evaluated after global security policies.

C.

Traffic can initially match multiple unified security policies.

D.

APPID results are used to determine the final security policy

Question 4

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

Options:

A.

building blocks

B.

assets

C.

events

D.

tests

Question 5

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

Options:

A.

Enable AppQoS on the proper security zones

B.

Enable APBR on the proper security zones

C.

Enable screen options on the proper security zones

D.

Enable AppTrack on the proper security zones.

Question 6

You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair.

Which step is necessary to accomplish this task?

Options:

A.

Issue the set chassis cluster disable reboot command on the primary node.

B.

Implement the control link recover/ solution before adjusting the priorities.

C.

Manually request the failover and identify the secondary node

D.

Adjust the priority in the configuration on the secondary node.

Question 7

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.

Which feed will the clients IP address be automatically added to in this situation?

Options:

A.

the command-and-control cloud feed

B.

the allowlist and blocklist feed

C.

the custom cloud feed

D.

the infected host cloud feed

Question 8

After JSA receives external events and flows, which two steps occur? (Choose two.)

Options:

A.

After formatting the data, the data is stored in an asset database.

B.

Before formatting the data, the data is analyzed for relevant information.

C.

Before the information is filtered, the information is formatted

D.

After the information is filtered, JSA responds with active measures

Question 9

You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.

Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?

Options:

A.

AppFW

B.

SIP ALG

C.

AppQoE

D.

AppQoS

Question 10

Which two statements are true about application identification? (Choose two.)

Options:

A.

Application identification can identity nested applications that are within Layer 7.

B.

Application identification cannot identify nested applications that are within Layer 7.

C.

Application signatures are the same as IDP signatures.

D.

Application signatures are not the same as IDP signatures.

Question 11

While working on an SRX firewall, you execute the show security policies policy-name detail command.

Which function does this command accomplish?

Options:

A.

It displays details about the default security policy.

B.

It identifies the different custom policies enabled.

C.

It shows the system log files for the local SRX Series device.

D.

It shows policy counters for a configured policy.

Question 12

Your manager asks you to provide firewall and NAT services in a private cloud.

Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

Options:

A.

a single vSRX

B.

a vSRX for firewall services and a separate vSRX for NAT services

C.

a cSRX for firewall services and a separate cSRX for NAT services

D.

a single cSRX

Question 13

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

Options:

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Question 14

Which two statements are correct about SSL proxy server protection? (Choose two.)

Options:

A.

You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.

B.

You must load the server certificates on the SRX Series device.

C.

The servers must be configured to use the SSL proxy function on the SRX Series device.

D.

You must import the root CA on the servers.

Question 15

You are deploying a new SRX Series device and you need to log denied traffic.

In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)

Options:

A.

session-init

B.

session-close

C.

deny

D.

count

Question 16

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

Options:

A.

scalability

B.

no required software license

C.

granular security

D.

infinite number of interfaces

Question 17

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Juniper ATP Cloud only uses one antivirus software package to analyze files.

B.

Juniper ATP Cloud uses multiple antivirus software packages to analyze files.

C.

Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.

D.

Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.

Question 18

Exhibit

Question # 18

Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?

Options:

A.

Forwarding Lookup

B.

Services ALGs

C.

Security Policy

D.

Screens

Question 19

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

Options:

A.

Juniper ATP Cloud allows the creation of allowlists.

B.

Juniper ATP Cloud uses a single antivirus software package to analyze files.

C.

Juniper ATP Cloud allows end users to bypass the inspection of files.

D.

Juniper ATP Cloud performs a cache lookup on files.

Question 20

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.

Which Juniper Networks solution will accomplish this task?

Options:

A.

JIMS

B.

Encrypted Traffic Insights

C.

UTM

D.

Adaptive Threat Profiling

Question 21

Which statement defines the function of an Application Layer Gateway (ALG)?

Options:

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Question 22

Your network uses a single JSA host and you want to implement a cluster.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

The software versions on both primary and secondary hosts

B.

The secondary host can backup multiple JSA primary hosts.

C.

The primary and secondary hosts must be configured with the same storage devices.

D.

The cluster virtual IP will need an unused IP address assigned.

Question 23

Exhibit

Question # 23

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Question 24

Your company is using the Juniper ATP Cloud free model. The current inspection profile is set at 10 MB You are asked to configure ATP Cloud so that executable files up to 30 MB can be scanned while at the same time minimizing the change in scan time for other file types.

Which configuration should you use in this scenario?

Options:

A.

Use the CLI to create a custom profile and increase the scan limit.

B.

Use the ATP Cloud Ul to change the default profile to increase the scan limit for all files to 30 MB.

C.

Use the CLI to change the default profile to increase the scan limit for all files to 30 MB.

D.

Use the ATP Cloud Ul to update a custom profile and increase the scan limit for executable files to 30 MB.

Question 25

Which two statements are true about mixing traditional and unified security policies? (Choose two.)

Options:

A.

When a packet matches a unified security policy, the evaluation process terminates

B.

Traditional security policies must come before unified security policies

C.

Unified security policies must come before traditional security policies

D.

When a packet matches a traditional security policy, the evaluation process terminates

Question 26

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

Options:

A.

vQFX

B.

MX

C.

vMX

D.

QFX

Question 27

What are two types of system logs that Junos generates? (Choose two.)

Options:

A.

SQL log files

B.

data plane logs

C.

system core dump files

D.

control plane logs

Question 28

How does Juniper ATP Cloud protect a network from zero-day threats?

Options:

A.

It uses a cache lookup.

B.

It uses antivirus software.

C.

It uses dynamic analysis.

D.

It uses known virus signatures.

Question 29

How does the SSL proxy detect if encryption is being used?

Options:

A.

It uses application identity services.

B.

It verifies the length of the packet

C.

It queries the client device.

D.

It looks at the destination port number.

Page: 1 / 10
Total 98 questions