Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Juniper JN0-636 Security, Professional (JNCIP-SEC) Exam Practice Test

Page: 1 / 12
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 1

Click the Exhibit button.

Question # 1

Which type of NAT is shown in the exhibit?

Options:

A.

NAT46

B.

NAT64

C.

persistent NAT

D.

DS-Lite

Question 2

You are asked to deploy filter-based forwarding on your SRX Series device for incoming traffic sourced from the 10.10 100 0/24 network in this scenario, which three statements are correct? (Choose three.)

Options:

A.

You must create a forwarding-type routing instance.

B.

You must create and apply a firewall filter that matches on the source address 10.10.100.0/24 and then sends this traffic to your routing

C.

You must create and apply a firewall filter that matches on the destination address 10 10.100.0/24 and then sends this traffic to your routing instance.

D.

You must create a RIB group that adds interface routes to your routing instance.

E.

You must create a VRF-type routing instance.

Question 3

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

Options:

A.

A maximum of 32 tenant systems can be configured on a physical SRX device.

B.

All tenant systems share a single routing protocol process.

C.

Each tenant system runs its own instance of the routing protocol process

D.

A maximum of 500 tenant systems can be configured on a physical SRX device.

Question 4

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

Options:

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Question 5

Exhibit.

Question # 5

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The configured solution allows IPv6 to IPv4 translation.

B.

The configured solution allows IPv4 to IPv6 translation.

C.

The IPv6 address is invalid.

D.

External hosts cannot initiate contact.

Question 6

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

Options:

A.

VRF instances

B.

virtual router instances

C.

logical systems

D.

tenant systems

Question 7

Exhibit

Question # 7

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This is the last packet in the session.

B.

The SRX Series device is performing both source and destination NAT on this session.

C.

This is the first packet in the session.

D.

The SRX Series device is performing only source NAT on this session.

Question 8

Exhibit

Question # 8

Which two statements are correct about the output shown in the exhibit. (Choose two.)

Options:

A.

The source address is translated.

B.

The packet is an SSH packet

C.

The packet matches a user-configured policy

D.

The destination address is translated.

Question 9

Exhibit

Question # 9

Which statement is true about the output shown in the exhibit?

Options:

A.

The SRX Series device is configured with default security forwarding options.

B.

The SRX Series device is configured with packet-based IPv6 forwarding options.

C.

The SRX Series device is configured with flow-based IPv6 forwarding options.

D.

The SRX Series device is configured to disable IPv6 packet forwarding.

Question 10

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

Options:

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Question 11

Exhibit

Question # 11

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Question 12

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Question 13

Exhibit

Question # 13

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

Options:

A.

Add multipoint to the st0.0 interface configuration on the branch1 device.

B.

Change the IKE proposal-set to compatible on the branch1 and corporate devices.

C.

Change the local identity to inet advpn on the branch1 device.

D.

Change the IKE mode to aggressive on the branch1 and corporate devices.

Question 14

You are requested to enroll an SRX Series device with Juniper ATP Cloud.

Which statement is correct in this scenario?

Options:

A.

If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.

B.

The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.

C.

When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period

D.

Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.

Question 15

The monitor traffic interface command is being used to capture the packets destined to and the from the SRX Series device.

In this scenario, which two statements related to the feature are true? (Choose two.)

Options:

A.

This feature does not capture transit traffic.

B.

This feature captures ICMP traffic to and from the SRX Series device.

C.

This feature is supported on high-end SRX Series devices only.

D.

This feature is supported on both branch and high-end SRX Series devices.

Question 16

You want to enforce I DP policies on HTTP traffic.

In this scenario, which two actions must be performed on your SRX Series device? (Choose two )

Options:

A.

Choose an attacks type in the predefined-attacks-group HTTP-All.

B.

Disable screen options on the Untrust zone.

C.

Specify an action of None.

D.

Match on application junos-http.

Question 17

Exhibit

Question # 17

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

Options:

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

Question 18

Exhibit

Question # 18

You have configured the SRX Series device to switch packets for multiple directly connected hosts that are within the same broadcast domain However, the traffic between two hosts in the same broadcast domain are not matching any security policies

Referring to the exhibit, what should you do to solve this problem?

Options:

A.

You must change the global mode to security switching mode.

B.

You must change the global mode to security bridging mode

C.

You must change the global mode to transparent bridge mode.

D.

You must change the global mode to switching mode.

Question 19

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

Options:

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Question 20

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

Options:

A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Question 21

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

Options:

A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Question 22

You issue the command shown in the exhibit.

Which policy will be active for the identified traffic?

Options:

A.

Policy p4

B.

Policy p7

C.

Policy p1

D.

Policy p12

Question 23

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

Options:

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Question 24

You are required to secure a network against malware. You must ensure that in the event that a

compromised host is identified within the network. In this scenario after a threat has been

identified, which two components are responsible for enforcing MAC-level infected host ?

Options:

A.

SRX Series device

B.

Juniper ATP Appliance

C.

Policy Enforcer

D.

EX Series device

Question 25

Exhibit

Question # 25

You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated.

Referring to the exhibit, what is a reason for this behavior?

Options:

A.

The C&C events are false positives.

B.

The infected host score is globally set bellow a threat level of 5.

C.

The infected host score is globally set above a threat level of 5.

D.

The ETI events are false positives.

Question 26

Which three type of peer devices are supported for Cos-Based IPsec VPN?

Options:

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

Question 27

Exhibit

Question # 27

Which two statements are correct about the output shown in the exhibit? (Choose two.)

Options:

A.

The packet is processed as host inbound traffic.

B.

The packet matches the default security policy.

C.

The packet matches a configured security policy.

D.

The packet is processed in the first path packet flow.

Question 28

Exhibit:

Question # 28

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

Options:

A.

Modify the log-all term to add the next term action

B.

Delete the log-all term

C.

Add a term before the log-all term that blocks Telnet

D.

Apply a firewall filter to the loopback interface that blocks Telnet traffic

Question 29

Exhibit

Question # 29

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

Options:

A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

Question 30

Exhibit

Question # 30

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

Options:

A.

IBGP

B.

OSPF

C.

IPsec

D.

DHCP

E.

NTP

Question 31

Exhibit

Question # 31

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Options:

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Question 32

To analyze and detect malware, Juniper ATP Cloud performs which two functions? (Choose two.)

Options:

A.

cache lookup: to see if the file is seen already and known to be malicious

B.

antivirus scan: with a single vendor solution to see if the file contains any potential threats

C.

dynamic analysis: to see what happens if you execute the file in a real environment

D.

static analysis: to see what happens if you execute the file in a real environment

Question 33

Exhibit

Question # 33

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Question 34

You are asked to download and install the IPS signature database to a device operating in chassis cluster mode. Which statement is correct in this scenario?

Options:

A.

You must download and install the IPS signature package on the primary node.

B.

The first synchronization of the backup node and the primary node must be performed manually.

C.

The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node must be rebooted.

D.

The IPS signature package must be downloaded and installed on the primary and backup nodes.

Page: 1 / 12
Total 115 questions