Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

JN0-335 Security - Specialist (JNCIS-SEC) Questions and Answers

Questions 4

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

Options:

A.

Juniper ATP Cloud allows the creation of allowlists.

B.

Juniper ATP Cloud uses a single antivirus software package to analyze files.

C.

Juniper ATP Cloud allows end users to bypass the inspection of files.

D.

Juniper ATP Cloud performs a cache lookup on files.

Buy Now
Questions 5

Which two statements are correct about AppTrack? (Choose two.)

Options:

A.

AppTrack can be configured for any defined logical system on an SRX Series device.

B.

AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.

C.

AppTrack collects traffic flow information including byte, packet, and duration statistics.

D.

AppTrack can only be configured in the main logical system on an SRX Series device.

Buy Now
Questions 6

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

Options:

A.

Web proxy

B.

client-protection

C.

server-protection

D.

DNS proxy

Buy Now
Questions 7

Click the Exhibit button.

You are validating the configuration template for device access. The commands in the exhibit have been entered to secure IP access to an SRX Series device.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The device manager can access the device from 192.168.11.248.

B.

The loopback interface blocks invalid traffic on its entry into the device.

C.

The loopback interface blocks invalid traffic on its exit from the device.

D.

The device manager can access the device from 10.253.1.2.

Buy Now
Questions 8

Which two statements are correct about JSA data collection? (Choose two.)

Options:

A.

The Event Collector collects information using BGP FlowSpec.

B.

The Flow Collector can use statistical sampling

C.

The Flow Collector parses logs.

D.

The Event Collector parses logs

Buy Now
Questions 9

You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair.

Which step is necessary to accomplish this task?

Options:

A.

Issue the set chassis cluster disable reboot command on the primary node.

B.

Implement the control link recover/ solution before adjusting the priorities.

C.

Manually request the failover and identify the secondary node

D.

Adjust the priority in the configuration on the secondary node.

Buy Now
Questions 10

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

Options:

A.

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.

B.

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.

C.

JIMS domain PC probes are triggered to map usernames to group membership information.

D.

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.

Buy Now
Questions 11

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.

Download the IPS signature database.

B.

Enroll the SRX Series device with Juniper ATP Cloud.

C.

Install the IPS signature database.

D.

Reboot the SRX Series device.

Buy Now
Questions 12

You are asked to block malicious applications regardless of the port number being used.

In this scenario, which two application security features should be used? (Choose two.)

Options:

A.

AppFW

B.

AppQoE

C.

APPID

D.

AppTrack

Buy Now
Questions 13

Exhibit

When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)

Options:

A.

The SSL proxy certificate ID is part of a blocklist.

B.

The SSL proxy certificate ID does not have the correct renegotiation option set.

C.

The SSL proxy certificate ID is for a forwarding proxy.

D.

The SSL proxy certificate ID does not exist.

Buy Now
Questions 14

You want to control when cluster failovers occur.

In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)

Options:

A.

hearcbeac-interval

B.

heartbeac-address

C.

hearcbeat-cos

D.

hearcbeac-chreshold

Buy Now
Questions 15

Which two statements are correct about SSL proxy server protection? (Choose two.)

Options:

A.

You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.

B.

You must load the server certificates on the SRX Series device.

C.

The servers must be configured to use the SSL proxy function on the SRX Series device.

D.

You must import the root CA on the servers.

Buy Now
Questions 16

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

Options:

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Buy Now
Questions 17

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

Options:

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Buy Now
Questions 19

What are two types of system logs that Junos generates? (Choose two.)

Options:

A.

SQL log files

B.

data plane logs

C.

system core dump files

D.

control plane logs

Buy Now
Questions 20

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

Options:

A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.

The fab interface enables configuration synchronization.

D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Buy Now
Questions 21

Exhibit

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

Options:

A.

Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.

B.

Execute the Junos commit full command to override the error and apply the configuration.

C.

Create a custom application named http at the [edit applications] hierarchy.

D.

Modify the security policy to use the built-in Junos-http applications.

Buy Now
Questions 22

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.

Adaptive Threat Profiling

B.

Juniper Secure Analytics

C.

Juniper Identity Management Service

D.

Intrusion Prevention System

Buy Now
Questions 23

What are three capabilities of AppQoS? (Choose three.)

Options:

A.

re-write DSCP values

B.

assign a forwarding class

C.

re-write the TTL

D.

rate-limit traffic

E.

reserve bandwidth

Buy Now
Questions 24

Click the Exhibit button.

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Buy Now
Questions 25

Which two statements are correct about a reth LAG? (Choose two.)

Options:

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Buy Now
Questions 26

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

Options:

A.

vQFX

B.

MX

C.

vMX

D.

QFX

Buy Now
Questions 27

Exhibit

Referring to the exhibit which statement is true?

Options:

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Buy Now
Questions 28

Your manager asks you to provide firewall and NAT services in a private cloud.

Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

Options:

A.

a single vSRX

B.

a vSRX for firewall services and a separate vSRX for NAT services

C.

a cSRX for firewall services and a separate cSRX for NAT services

D.

a single cSRX

Buy Now
Questions 29

Which two statements are true about the vSRX? (Choose two.)

Options:

A.

AWS is supported as an laaS solution.

B.

AWS is not supported as an laaS solution.

C.

OpenStack is not supported as a cloud orchestration solution.

D.

OpenStack is supported as a cloud orchestration solution.

Buy Now
Exam Code: JN0-335
Exam Name: Security - Specialist (JNCIS-SEC)
Last Update: May 18, 2024
Questions: 98

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80