New Year Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Juniper JN0-637 Dumps

Page: 1 / 12
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 1

A company has acquired a new branch office that has the same address space of one of its local networks, 192.168.100/24. The offices need to communicate with each other.

Which two NAT configurations will satisfy this requirement? (Choose two.)

Options:

A.

[edit security nat source]

user@OfficeA# show rule-set OfficeBtoA {

from zone OfficeB;

to zone OfficeA;

rule 1 {

match {

source-address 192.168.210.0/24;

destination-address 192.168.200.0/24;

}

then {

source-nat {

interface;

}

}

}

}

B.

[edit security nat static]

user@OfficeA# show rule-set From-Office-B {

from interface ge-0/0/0.0;

rule 1 {

match {

destination-address 192.168.200.0/24;

}

then {

static-nat {

prefix 192.168.100.0/24;

}

}

}

}

C.

[edit security nat static]

user@OfficeB# show rule-set From-Office-A {

from interface ge-0/0/0.0;

rule 1 {

match {

destination-address 192.168.210.0/24;

}

then {

static-nat {

prefix 192.168.100.0/24;

}

}

}

}

D.

[edit security nat source]

user@OfficeB# show rule-set OfficeAtoB {

from zone OfficeA;

to zone OfficeB;

rule 1 {

match {

source-address 192.168.200.0/24;

destination-address 192.168.210.0/24;

}

then {

source-nat {

interface;

}

}

}

}

Question 2

Referring to the exhibit,

as

which two statements about User1 are true? (Choose two.)

Options:

A.

User1 has access to the configuration specific to their assigned logical system.

B.

User1 is logged in to logical system LSYS-1.

C.

User1 can add logical units to an interface that a primary administrator has not previously assigned.

D.

User1 can view outputs from other user logical systems.

Question 3

Your IPsec tunnel is configured with multiple security associations (SAs). Your SRX Series device supports the CoS-based IPsec VPNs with multiple IPsec SAs feature. You are asked to configure CoS for this tunnel.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

The local and remote gateways do not need the forwarding classes to be defined in the same order.

B.

A maximum of four forwarding classes can be configured for a VPN with the multi-sa forwarding-classes statement.

C.

The local and remote gateways must have the forwarding classes defined in the same order.

D.

A maximum of eight forwarding classes can be configured for a VPN with the multi-sa forwarding-classes statement.

Question 4

Exhibit:

as

You created a Unified security policy called test on the network edge srx series firewall.

According to the firewall, this new security policy is not passing traffic.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

The test policy should be the last policy.

B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

C.

The source address cannot be any when a dynamic application is configured.

D.

The drop-http policy is a terminating rule and will drop the traffic.

Question 5

Referring to the exhibit, you have been assigned the user LogicalSYS1 credentials shown in

the configuration.

as

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

When you log in to the device, you will be permitted to view all routing tables available on the SRX device

B.

When you log in to the device, you will be permitted to view only the routing tables for Logic

C.

When you log in to the device, you will be located at the operational mode of the Logic

D.

When you log in to the device, you will be located at the operational mode of the main system

Question 6

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

Options:

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Question 7

The exhibit shows part of the flow session logs.

as

Which two statements are true in this scenario? (Choose two.)

Options:

A.

The existing session is found in the table, and the fast path process begins.

B.

This packet arrives on interface ge-0/0/4.0.

C.

Junos captures a TCP packet from source address 172.20.101.10 destined to 10.0.1.129.

D.

Destination NAT occurs.

Question 8

How does an SRX Series device examine exception traffic?

Options:

A.

The device examines the host-inbound traffic for the ingress interface and zone.

B.

The device examines the host-outbound traffic for the ingress interface and zone.

C.

The device examines the host-inbound traffic for the egress interface and zone.

D.

The device examines the host-outbound traffic for the egress interface and zone.

Question 9

Exhibit:

as

as

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are not active and will not respond to ARP requests to the virtual IP MAC address.

B.

This device is the backup node for SRG1.

C.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are active and will respond to ARP requests to the virtual IP MAC address.

D.

This device is the active node for SRG1.

Question 10

You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.

Which product provides this capability?

Options:

A.

Security Director

B.

Network Director

C.

Mist

D.

Security Director Insights

Question 11

Which two statements are true regarding NAT64? (Choose two.)

Options:

A.

An SRX Series device should be in flow-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv4.

C.

An SRX Series device should be in packet-based forwarding mode for IPv6.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Question 12

Referring to the exhibit,

as

which statement about TLS 1.2 traffic is correct?

Options:

A.

TLS 1.2 traffic will be sent to routing instance R1 but not forwarded to the next hop.

B.

TLS 1.2 traffic will be sent to routing instance R1 and forwarded to next hop 10.1.0.1.

C.

TLS 1.2 traffic will be sent to routing instance R2 but not forwarded to the next hop.

D.

TLS 1.2 traffic will be sent to routing instance R2 and forwarded to next hop 10.2.0.1.

Question 13

You are deploying OSPF over IPsec with an SRX Series device and third-party device using GRE.

Which two statements are correct? (Choose two.)

Options:

A.

The GRE interface should use lo0 as endpoints.

B.

The OSPF protocol must be enabled under the VPN zone.

C.

Overlapping addresses are allowed between remote networks.

D.

The GRE interface must be configured under the OSPF protocol.

Question 14

You want to test how the device handles a theoretical session without generating traffic on the Junos security device.

Which command is used in this scenario?

Options:

A.

request security policies check

B.

show security flow session

C.

show security match-policies

D.

show security policies

Question 15

You have a multinode HA default mode deployment and the ICL is down.

In this scenario, what are two ways that the SRX Series devices verify the activeness of their peers? (Choose two.)

Options:

A.

Custom IP addresses may be configured for the activeness probe.

B.

Fabric link heartbeats are used to verify the activeness of the peers.

C.

Each peer sends a probe with the virtual IP address as the destination IP address.

D.

Each peer sends a probe with the virtual IP address as the source IP address and the upstream router as the destination IP address.

Question 16

You configure two Ethernet interfaces on your SRX Series device as Layer 2 interfaces and add them to the same VLAN. The SRX is using the default L2-learning setting. You do not add the interfaces to a security zone.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You are unable to apply stateful security features to traffic that is switched between the two interfaces.

B.

You are able to apply stateful security features to traffic that enters and exits the VLAN.

C.

The interfaces will not forward traffic by default.

D.

You cannot add Layer 2 interfaces to a security zone.

Question 17

Which two statements are true regarding NAT64? (Choose two.)

Options:

A.

An SRX Series device should be in packet-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv6.

C.

An SRX Series device should be in flow-based forwarding mode for IPv4.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Question 18

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

Options:

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

C.

One security profile can only be applied to one logical system.

D.

One security profile can be applied to multiple logical systems.

Question 19

The SRX series device is performing static NAT. you want to ensure that host A can reach the

internal webserver using domain name.

as

Referring to the exhibit, which two Junos features are required to accomplish this task? (Choose two.)

Options:

A.

DNS doctoring

B.

proxy ARP

C.

persistent NAT

D.

STUN

Question 20

Exhibit:

as

The Ipsec VPN does not establish when the peer initiates, but it does establish when the SRX

series device initiates. Referring to the exhibit, what will solve this problem?

Options:

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

B.

The screen configuration on the untrust zone needs to be modified.

C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

D.

Application tracking on the untrust zone needs to be removed.

Question 21

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

Options:

A.

IDP disable is not configured on the APBR rule.

B.

The application services bypass is not configured on the APBR rule.

C.

The APBR rule does a match on the first packet.

D.

The session did not properly reclassify midstream to the correct APBR rule.

Question 22

Which two statements about policy enforcer and the forescout integration are true? (Choose two)

Options:

A.

802.1X authenticated devices are supported.

B.

802.1X authenticated devices are not supported.

C.

A Forescout CounterACT agent must be installed on third-party devices

D.

A Forescout CounterACT agent is agentless and does not need to be installed on third-party device

Question 23

You are deploying threat remediation to endpoints connected through third-party devices.

In this scenario, which three statements are correct? (Choose three.)

Options:

A.

All third-party switches must support AAA/RADIUS and Dynamic Authorization Extensions to the RADIUS protocol.

B.

The connector uses an API to gather endpoint MAC address information from the RADIUS server.

C.

All third-party switches in the specified network are automatically mapped and registered with the RADIUS server.

D.

The connector queries the RADIUS server for the infected host endpoint details and initiates a change of authorization (CoA) for the infected host.

E.

The RADIUS server sends Status-Server messages to update infected host information to the connector.

Question 24

Which two statements are true when setting up an SRX Series device to operate in mixed mode? (Choose two.)

Options:

A.

A physical interface can be configured to be both a Layer 2 and a Layer 3 interface at the same time.

B.

User logical systems support Layer 2 traffic processing.

C.

The SRX must be rebooted after configuring at least one Layer 3 and one Layer 2 interface.

D.

Packets from Layer 2 interfaces are switched within the same bridge domain.

Question 25

Exhibit:

as

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

Options:

A.

DS-Lite

B.

NAT444

C.

NAT46

D.

full cone NAT

Question 26

Exhibit:

as

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Hosts in the Local zone can be enabled for control plane access to the SRX.

B.

An IRB interface is required to enable communication between the Trust and the Untrust zones.

C.

You can configure security policies for traffic flows between hosts in the Local zone.

D.

Hosts in the Local zone can communicate with hosts in the Trust zone with a security policy.

Question 27

You are asked to connect two hosts that are directly connected to an SRX Series device. The traffic should flow unchanged as it passes through the SRX, and routing or switch lookups should not be performed. However, the traffic should still be subjected to security policy checks.

What will provide this functionality?

Options:

A.

MACsec

B.

Mixed mode

C.

Secure wire

D.

Transparent mode

Question 28

Click the Exhibit button.

as

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The traffic is permitted.

B.

The traffic was initiated by the 10.10.102.10 address.

C.

The destination device is not responding.

D.

The traffic is denied.

Question 29

Which two statements describe the behavior of logical systems? (Choose two.)

Options:

A.

Each logical system shares the routing protocol process.

B.

A default routing instance must be manually created for each logical system

C.

Each logical system has a copy of the routing protocol process.

D.

A default routing instance is automatically created for each logical system.

Question 30

Exhibit:

as

You are asked to ensure that Internet users can access the company's internal webserver using its FQDN. However, the internal DNS server's A record only points to the webserver's private address.

Referring to the exhibit, which two actions are required to complete this task? (Choose two.)

Options:

A.

Disable the DNS ALG.

B.

Configure static NAT for both the DNS server and the webserver.

C.

Configure destination NAT for both the DNS server and the webserver.

D.

Configure proxy ARP on ge-0/0/3.

Question 31

You Implement persistent NAT to allow any device on the external side of the firewall to

initiate traffic.

as

Referring to the exhibit, which statement is correct?

Options:

A.

The target-host parameter should be used instead of the any-remote-host parameter.

B.

The port-overloading parameter needs to be turned off in the NAT source interface configuration

C.

The target-host-port parameter should be used instead of the any-remote-host parameter

D.

The any-remote-host parameter does not support interface-based NAT and needs an IP pod to work.

Question 32

You want to enable transparent mode on your SRX series device.

In this scenario, which three actions should you perform? (Choose three.)

Options:

A.

Enable the ethernet-switching family on your Layer 2 interfaces

B.

Install a Layer 2 feature license.

C.

Reboot the SRX device.

D.

Ensure that no IRB interfaces are configured on the device.

E.

Add your Layer 2 interfaces to a security zone.

Question 33

Which two statements are correct about DNS doctoring?

Options:

A.

The DNS ALG must be disabled.

B.

Proxy ARP is required if your NAT pool for the server is on the same subnet as the uplink interface.

C.

Proxy ARP is required if your NAT pool for the server is on a different subnet as the uplink interface

D.

The DNS ALG must be enabled.

Question 34

A user reports that a specific application is not working properly. This application makes

multiple connection to the server and must have the same address every time from a pool and this behavior needs to be changed.

What would solve this problem?

Options:

A.

Use STUN.

B.

Use DNS doctoring.

C.

Use the address-persistent parameter.

D.

Use the persistent-nat parameter.

Page: 1 / 12
Total 115 questions