Security-Associate (JNCIA-SEC) Questions and Answers
You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the
Internet. You do not want the webservers to initiate connections with external update servers on the Internet using the same IP address as customers use to access them.
Which two NAT types must be used to complete this project? (Choose two.)
Which two criteria should a zone-based security policy include? (Choose two.)
What information does the show chassis routing-engine command provide?
Which two statements are correct about functional zones? (Choose two.)
Which two addresses are valid address book entries? (Choose two.)
You are creating Ipsec connections.
In this scenario, which two statements are correct about proxy IDs? (Choose two.)
You want to provide remote access to an internal development environment for 10 remote developers.
Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)
You have configured a UTM feature profile.
Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)
Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)
You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.
Which NAT configuration is appropriate in this scenario?
Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)
When configuring antispam, where do you apply any local lists that are configured?
Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?
You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.
Which security feature should you implement in this scenario?
Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)
You want to block executable files ("exe) from being downloaded onto your network.
Which UTM feature would you use in this scenario?
Which statement is correct about Junos security policies?
Which statement about NAT is correct?
Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.
In this scenario, which security feature would you use to satisfy this request?
Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.
Which Juniper ATP feature should you configure to accomplish this task?
What are two characteristics of a null zone? (Choose two.)
What are three primary match criteria used in a Junos security policy? (Choose three.)
Which two statements are correct about global policies? (Choose two.)
Which two statements about the Junos OS CLI are correct? (Choose two.)
Which two statements about user-defined security zones are correct? (Choose two.)
Click the Exhibit button.
Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)
Which two services does Juniper Connected Security provide? (Choose two.)
Which statement is correct about packet mode processing?
What must be enabled on an SRX Series device for the reporting engine to create reports?
Which two statements are correct about the null zone on an SRX Series device? (Choose two.)
When creating a site-to-site VPN using the J-Web shown in the exhibit, which statement is correct?