New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Juniper JN0-231 Security-Associate (JNCIA-SEC) Exam Practice Test

Page: 1 / 11
Total 105 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Question 1

You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file.

In this scenario, which command would accomplish this task?

Options:

A.

configure master

B.

cli privileged

C.

configure exclusive

D.

configure

Question 2

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.

Which NAT type must be used to complete this project?

Options:

A.

source NAT

B.

destination NAT

C.

static NAT

D.

hairpin NAT

Question 3

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

Options:

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Question 4

Which two statements are correct about IKE security associations? (Choose two.)

Options:

A.

IKE security associations are established during IKE Phase 1 negotiations.

B.

IKE security associations are unidirectional.

C.

IKE security associations are established during IKE Phase 2 negotiations.

D.

IKE security associations are bidirectional.

Question 5

Which Web filtering solution uses a direct Internet-based service for URL categorization?

Options:

A.

Juniper ATP Cloud

B.

Websense Redirect

C.

Juniper Enhanced Web Filtering

D.

local blocklist

Question 6

Which security policy type will be evaluated first?

Options:

A.

A zone policy with no dynamic application set

B.

A global with no dynamic application set

C.

A zone policy with a dynamic application set

D.

A global policy with a dynamic application set

Question 7

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.

Which Juniper ATP feature should you configure to accomplish this task?

Options:

A.

IPsec

B.

static NAT

C.

allowlists

D.

C&C feeds

Question 8

Click the Exhibit button.

Question # 8

Referring to the exhibit, a user is placed in which hierarchy when the exit command is run?

Options:

A.

[edit security policies from-zone trust to-zone dmz]

user@vSRX-1#

B.

[edit]

user@vSRX-1#

C.

[edit security policies]

user@vSRX-1#

D.

user@vSRX-1>

Question 9

Which statement is correct about unified security policies on an SRX Series device?

Options:

A.

A zone-based policy is always evaluated first.

B.

The most restrictive policy is applied regardless of the policy level.

C.

A global policy is always evaluated first.

D.

The first policy rule is applied regardless of the policy level.

Question 10

What are three Junos UTM features? (Choose three.)

Options:

A.

screens

B.

antivirus

C.

Web filtering

D.

IDP/IPS

E.

content filtering

Question 11

You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution.

Which solution satisfies the requirement?

Options:

A.

Juniper Sky Enterprise

B.

J-Web

C.

Junos Secure Connect

D.

Junos Space

Question 12

An application firewall processes the first packet in a session for which the application has not yet been identified.

In this scenario, which action does the application firewall take on the packet?

Options:

A.

It allows the first packet.

B.

It denies the first packet and sends an error message to the user.

C.

It denies the first packet.

D.

It holds the first packet until the application is identified.

Question 13

Which two user authentication methods are supported when using a Juniper Secure Connect VPN? (Choose two.)

Options:

A.

certificate-based

B.

multi-factor authentication

C.

local authentication

D.

active directory

Question 14

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Juniper ATP Cloud is an on-premises ATP appliance.

B.

Juniper ATP Cloud can be used to block and allow IPs.

C.

Juniper ATP Cloud is a cloud-based ATP subscription.

D.

Juniper ATP Cloud delivers intrusion protection services.

Question 15

Which two statements are correct about screens? (Choose two.)

Options:

A.

Screens process inbound packets.

B.

Screens are processed on the routing engine.

C.

Screens process outbound packets.

D.

Screens are processed on the flow module.

Question 16

Which order is correct for Junos security devices that examine policies for transit traffic?

Options:

A.

zone policies

global policies

default policies

B.

default policies

zone policies

global policies

C.

default policies

global policies

zone policies

D.

global policies

zone policies

default policies

Question 17

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

Options:

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Question 18

Which two statements are correct about IPsec security associations? (Choose two.)

Options:

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Question 19

What does the number “2” indicate in interface ge-0/1/2?

Options:

A.

the physical interface card (PIC)

B.

the flexible PIC concentrator (FPC)

C.

the interface logical number

D.

the port number

Question 20

You are monitoring an SRX Series device that has the factory-default configuration applied.

In this scenario, where are log messages sent by default?

Options:

A.

Junos Space Log Director

B.

Junos Space Security Director

C.

to a local syslog server on the management network

D.

to a local log file named messages

Question 21

What is the main purpose of using screens on an SRX Series device?

Options:

A.

to provide multiple ports for accessing security zones

B.

to provide an alternative interface into the CLI

C.

to provide protection against common DoS attacks

D.

to provide information about traffic patterns traversing the network

Question 22

What is the order in which malware is detected and analyzed?

Options:

A.

antivirus scanning –> cache lookup –> dynamic analysis –> static analysis

B.

cache lookup –> antivirus scanning –> static analysis –> dynamic analysis

C.

antivirus scanning –> cache lookup –> static analysis –> dynamic analysis

D.

cache lookup –> static analysis –> dynamic analysis –> antivirus scanning

Question 23

Which two statements about user-defined security zones are correct? (Choose two.)

Options:

A.

Users cannot share security zones between routing instances.

B.

Users can configure multiple security zones.

C.

Users can share security zones between routing instances.

D.

User-defined security zones do not apply to transit traffic.

Question 24

You want to deploy a NAT solution.

In this scenario, which solution would provide a static translation without PAT?

Options:

A.

interface-based source NAT

B.

pool-based NAT with address shifting

C.

pool-based NAT with PAT

D.

pool-based NAT without PAT

Question 25

Which two statements are correct about the default behavior on SRX Series devices? (Choose two.)

Options:

A.

The SRX Series device is in flow mode.

B.

The SRX Series device supports stateless firewalls filters.

C.

The SRX Series device is in packet mode.

D.

The SRX Series device does not support stateless firewall filters.

Question 26

Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)

Options:

A.

SHA-1

B.

SHAKE128

C.

MD5

D.

RIPEMD-256

Question 27

Which statement is correct about static NAT?

Options:

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Question 28

You are deploying an SRX Series firewall with multiple NAT scenarios.

In this situation, which NAT scenario takes priority?

Options:

A.

interface NAT

B.

source NAT

C.

static NAT

D.

destination NAT

Question 29

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

Options:

A.

the content filtering UTM feature

B.

the antivirus UTM feature

C.

the Web filtering UTM feature

D.

the antispam UTM feature

Question 30

You have multiple branch locations using an SRX Series device. You want a cloud-based solution to configure and monitor this device.

this scenario, which solution would you use?

Options:

A.

J-Web

B.

Juniper Sky Enterprise

C.

Junos Space Security Director

D.

Juniper Secure Analytics

Question 31

When transit traffic matches a security policy, which three actions are available? (Choose three.)

Options:

A.

Allow

B.

Discard

C.

Deny

D.

Reject

E.

Permit

Page: 1 / 11
Total 105 questions