Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Juniper JN0-231 Dumps

Page: 1 / 11
Total 105 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Question 1

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the

Internet. You do not want the webservers to initiate connections with external update servers on the Internet using the same IP address as customers use to access them.

Which two NAT types must be used to complete this project? (Choose two.)

Options:

A.

static NAT

B.

hairpin NAT

C.

destination NAT

D.

source NAT

Question 2

Which two criteria should a zone-based security policy include? (Choose two.)

Options:

A.

a source port

B.

a destination port

C.

zone context

D.

an action

Question 3

What information does the show chassis routing-engine command provide?

Options:

A.

chassis serial number

B.

resource utilization

C.

system version

D.

routing tables

Question 4

Which two statements are correct about functional zones? (Choose two.)

Options:

A.

Functional zones must have a user-defined name.

B.

Functional zone cannot be referenced in security policies or pass transit traffic.

C.

Multiple types of functional zones can be defined by the user.

D.

Functional zones are used for out-of-band device management.

Question 5

Which two addresses are valid address book entries? (Choose two.)

Options:

A.

173.145.5.21/255.255.255.0

B.

153.146.0.145/255.255.0.255

C.

203.150.108.10/24

D.

191.168.203.0/24

Question 6

You are creating Ipsec connections.

In this scenario, which two statements are correct about proxy IDs? (Choose two.)

Options:

A.

Proxy IDs are used to configure traffic selectors.

B.

Proxy IDs are optional for Phase 2 session establishment.

C.

Proxy IDs must match for Phase 2 session establishment.

D.

Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.

Question 7

You want to provide remote access to an internal development environment for 10 remote developers.

Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)

Options:

A.

an additional license for an SRX Series device

B.

Juniper Secure Connect client software

C.

an SRX Series device with an SPC3 services card

D.

Marvis virtual network assistant

Question 8

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)

Options:

A.

Associate the UTM policy with an address book.

B.

Associate the UTM policy with a firewall filter.

C.

Associate the UTM policy with a security policy.

D.

Associate the UTM feature profile with a UTM policy.

Question 9

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

Options:

A.

the content filtering UTM feature

B.

the antivirus UTM feature

C.

the Web filtering UTM feature

D.

the antispam UTM feature

Question 10

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

Options:

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Question 11

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

Options:

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Question 12

When configuring antispam, where do you apply any local lists that are configured?

Options:

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Question 13

Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?

Options:

A.

firewall filters

B.

UTM

C.

Juniper ATP Cloud

D.

IPS

Question 14

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

Options:

A.

integrated user firewall

B.

screens

C.

802.1X

D.

Juniper ATP

Question 15

Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)

Options:

A.

Junos-host

B.

functional

C.

null

D.

management

Question 16

You want to block executable files ("exe) from being downloaded onto your network.

Which UTM feature would you use in this scenario?

Options:

A.

IPS

B.

Web filtering

C.

content filtering

D.

antivirus

Question 17

Which statement is correct about Junos security policies?

Options:

A.

Security policies enforce rules that should be applied to traffic transiting an SRX Series device.

B.

Security policies determine which users are allowed to access an SRX Series device.

C.

Security policies control the flow of internal traffic within an SRX Series device.

D.

Security policies identity groups of users that have access to different features on an SRX Series device.

Question 18

Which statement about NAT is correct?

Options:

A.

Destination NAT takes precedence over static NAT.

B.

Source NAT is processed before security policy lookup.

C.

Static NAT is processed after forwarding lookup.

D.

Static NAT takes precedence over destination NAT.

Question 19

Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.

In this scenario, which security feature would you use to satisfy this request?

Options:

A.

antivirus

B.

Web filtering

C.

content filtering

D.

antispam

Question 20

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.

Which Juniper ATP feature should you configure to accomplish this task?

Options:

A.

IPsec

B.

static NAT

C.

allowlists

D.

C&C feeds

Question 21

What are two characteristics of a null zone? (Choose two.)

Options:

A.

The null zone is configured by the super user.

B.

By default, all unassigned interfaces are placed in the null zone.

C.

All ingress and egress traffic on an interface in a null zone is permitted.

D.

When an interface is deleted from a zone, it is assigned back to the null zone.

Question 22

What are three primary match criteria used in a Junos security policy? (Choose three.)

Options:

A.

application

B.

source address

C.

source port

D.

class

E.

destination address

Question 23

Which two statements are correct about global policies? (Choose two.)

Options:

A.

Global policies are evaluated after default policies.

B.

Global policies do not have to reference zone context.

C.

Global policies are evaluated before default policies.

D.

Global policies must reference zone contexts.

Question 24

Which two statements about the Junos OS CLI are correct? (Choose two.)

Options:

A.

The default configuration requires you to log in as the admin user.

B.

A factory-default login assigns the hostname Amnesiac to the device.

C.

Most Juniper devices identify the root login prompt using the % character.

D.

Most Juniper devices identify the root login prompt using the > character.

Question 25

Which two statements about user-defined security zones are correct? (Choose two.)

Options:

A.

Users cannot share security zones between routing instances.

B.

Users can configure multiple security zones.

C.

Users can share security zones between routing instances.

D.

User-defined security zones do not apply to transit traffic.

Question 26

Click the Exhibit button.

as

Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)

Options:

A.

UDP traffic matched by the deny-all policy will be silently dropped.

B.

TCP traffic matched by the reject-all policy will have a TCP RST sent.

C.

TCP traffic matched from the zone trust is allowed by the permit-all policy.

D.

UDP traffic matched by the reject-all policy will be silently dropped.

Question 27

Which two services does Juniper Connected Security provide? (Choose two.)

Options:

A.

protection against zero-day threats

B.

IPsec VPNs

C.

Layer 2 VPN tunnels

D.

inline malware blocking

Question 28

Which statement is correct about packet mode processing?

Options:

A.

Packet mode enables session-based processing of incoming packets.

B.

Packet mode works with NAT, VPNs, UTM, IDP, and other advanced security services.

C.

Packet mode bypasses the flow module.

D.

Packet mode is the basis for stateful processing.

Question 29

What must be enabled on an SRX Series device for the reporting engine to create reports?

Options:

A.

System logging

B.

SNMP

C.

Packet capture

D.

Security logging

Question 30

Which two statements are correct about the null zone on an SRX Series device? (Choose two.)

Options:

A.

The null zone is created by default.

B.

The null zone is a functional security zone.

C.

Traffic sent or received by an interface in the null zone is discarded.

D.

You must enable the null zone before you can place interfaces into it.

Question 31

When creating a site-to-site VPN using the J-Web shown in the exhibit, which statement is correct?

Options:

A.

The remote gateway is configured automatically based on the local gateway settings.

B.

RIP, OSPF, and BGP are supported under Routing mode.

C.

The authentication method is pre-shared key or certificate based.

D.

Privately routable IP addresses are required.

Page: 1 / 11
Total 105 questions