Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

JN0-636 Security Professional (JNCIP-SEC) Questions and Answers

Questions 4

Exhibit

You have configured the SRX Series device to switch packets for multiple directly connected hosts that are within the same broadcast domain However, the traffic between two hosts in the same broadcast domain are not matching any security policies

Referring to the exhibit, what should you do to solve this problem?

Options:

A.

You must change the global mode to security switching mode.

B.

You must change the global mode to security bridging mode

C.

You must change the global mode to transparent bridge mode.

D.

You must change the global mode to switching mode.

Buy Now
Questions 5

You are asked to deploy filter-based forwarding on your SRX Series device for incoming traffic sourced from the 10.10 100 0/24 network in this scenario, which three statements are correct? (Choose three.)

Options:

A.

You must create a forwarding-type routing instance.

B.

You must create and apply a firewall filter that matches on the source address 10.10.100.0/24 and then sends this traffic to your routing

C.

You must create and apply a firewall filter that matches on the destination address 10 10.100.0/24 and then sends this traffic to your routing instance.

D.

You must create a RIB group that adds interface routes to your routing instance.

E.

You must create a VRF-type routing instance.

Buy Now
Questions 6

Exhibit:

Referring to the exhibit, your company’s infrastructure team implemented new printers

To make sure that the policy enforcer pushes the updated Ip address list to the SRX.

Which three actions are required to complete the requirement? (Choose three )

Options:

A.

Configure the server feed URL as http://172.25.10.254/myprinters

B.

Create a security policy that uses the dynamic address feed to allow access

C.

Configure Security Director to create a dynamic address feed

D.

Configure Security Director to create a C&C feed.

E.

Configure server feed URL as https://172.25.10.254/myprinters.

Buy Now
Questions 7

Exhibit

Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.

Which two commands will solve this problem? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 8

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

Options:

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Buy Now
Questions 9

You are asked to control access to network resources based on the identity of an authenticated device

Which three steps will accomplish this goal on the SRX Series firewalls? (Choose three )

Options:

A.

Configure an end-user-profile that characterizes a device or set of devices

B.

Reference the end-user-profile in the security zone

C.

Reference the end-user-profile in the security policy.

D.

Apply the end-user-profile at the interface connecting the devices

E.

Configure the authentication source to be used to authenticate the device

Buy Now
Questions 10

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

Options:

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Buy Now
Questions 11

you are connecting two remote sites to your corporate headquarters site. You must ensure that traffic

passes corporate headquarter.

In this scenario, which VPN should be used?

Options:

A.

full mesh IPsec VPNs with tunnels between all sites

B.

a full mesh Layer 3 VPN with the BGP route reflector behind the corporate firewall device

C.

a Layer 3 VPN with the corporate firewall acting as the hub device

D.

hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device

Buy Now
Questions 12

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

Options:

A.

WELF

B.

JSON

C.

CEF

D.

binay

Buy Now
Questions 13

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

Options:

A.

Configure the tenant as TSYS1 for the pi security profile.

B.

Configure the tenant as root for the pi security profile.

C.

Configure the tenant as master for the pi security profile.

D.

Configure the tenant as local for the pi security profile

Buy Now
Questions 14

Exhibit

You are using trace options to verity NAT session information on your SRX Series device

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This packet is part of an existing session.

B.

The SRX device is changing the source address on this packet from

C.

This is the first packet in the session

D.

The SRX device is changing the destination address on this packet 10.0.1 1 to 172 20.101.10.

Buy Now
Questions 15

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Buy Now
Questions 16

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

Options:

A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Buy Now
Questions 17

Refer to the exhibit,

which two potential violations will generate alarm ? (Choose Two)

Options:

A.

the number of policy violations by a source network identifier

B.

the ratio of policy violation traffic compared to accepted traffic.

C.

the number of policy violation by a destination TCP port

D.

the number of policy violation to an application within a specified period

Buy Now
Questions 18

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

Options:

A.

1

B.

3

C.

4

D.

2

Buy Now
Questions 19

Exhibit

Options:

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Buy Now
Questions 20

You configured a chassis cluster for high availability on an SRX Series device and enrolled this HA cluster with the Juniper ATP Cloud. Which two statements are correct in this scenario? (Choose two.)

Options:

A.

You must use different license keys on both cluster nodes.

B.

When enrolling your devices, you only need to enroll one node.

C.

You must set up your HA cluster after enrolling your devices with Juniper ATP Cloud

D.

You must use the same license key on both cluster nodes.

Buy Now
Questions 21

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

Options:

A.

200l:DB8:0:f101;:2

B.

192.168.30.191

C.

192.168.30.190

D.

192.168.30.188

Buy Now
Questions 22

You are asked to look at a configuration that is designed to take all traffic with a specific source ip address and forward the

traffic to a traffic analysis server for further evaluation. The configuration is no longer working as intended.

Referring to the exhibit which change must be made to correct the configuration?

Options:

A.

Apply the filter as in input filter on interface xe-0/2/1.0

B.

Apply the filter as in input filter on interface xe-0/0/1.0

C.

Create a routing instance named default

D.

Apply the filter as in output filter on interface xe-0/1/0.0

Buy Now
Questions 23

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Buy Now
Questions 24

Exhibit

You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated.

Referring to the exhibit, what is a reason for this behavior?

Options:

A.

The C&C events are false positives.

B.

The infected host score is globally set bellow a threat level of 5.

C.

The infected host score is globally set above a threat level of 5.

D.

The ETI events are false positives.

Buy Now
Questions 25

which security feature bypasses routing or switching lookup?

Options:

A.

transparent mode

B.

secure wire

C.

mixed mode

D.

MACsec

Buy Now
Questions 26

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

Options:

A.

The DNS doctoring ALG is not enabled by default.

B.

The Proxy ARP feature must be configured.

C.

The DNS doctoring ALG is enabled by default.

D.

The DNS CNAME record is translated.

Buy Now
Questions 27

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

Buy Now
Questions 28

You want to use selective stateless packet-based forwarding based on the source address.

In this scenario, which command will allow traffic to bypass the SRX Series device flow daemon?

Options:

A.

set firewall family inet filter bypaa3_flowd term t1 then skip—services accept

B.

set firewall family inet filter bypass_flowd term t1 then routing-instance stateless

C.

set firewall family inet filter bypas3_flowd term t1 then virtual-channel stateless

D.

set firewall family inet filter bypass__f lowd term t1 then packet—mode

Buy Now
Questions 29

In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)

Options:

A.

Send a custom message

B.

Close the connection.

C.

Drop the connection silently.

D.

Quarantine the host.

Buy Now
Questions 30

What is the purpose of the Switch Microservice of Policy Enforcer?

Options:

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

Buy Now
Questions 31

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

Options:

A.

Mismatched proxy ID

B.

Mismatched peer ID

C.

Mismatched preshared key

D.

Incorrect peer address.

Questions 32

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 33

You want to identify potential threats within SSL-encrypted sessions without requiring SSL proxy to decrypt the session contents. Which security feature achieves this objective?

Options:

A.

infected host feeds

B.

encrypted traffic insights

C.

DNS security

D.

Secure Web Proxy

Buy Now
Exam Code: JN0-636
Exam Name: Security Professional (JNCIP-SEC)
Last Update: May 18, 2024
Questions: 115

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80