New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Juniper JN0-231 Dumps Questions Answers

Page: 1 / 8
Total 105 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Question 1

When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)

Options:

A.

MPLS

B.

UTM

C.

CoS

D.

IDP

Buy Now
Question 2

Which two statements are correct about IKE security associations? (Choose two.)

Options:

A.

IKE security associations are established during IKE Phase 1 negotiations.

B.

IKE security associations are unidirectional.

C.

IKE security associations are established during IKE Phase 2 negotiations.

D.

IKE security associations are bidirectional.

Question 3

Which two statements about the Junos OS CLI are correct? (Choose two.)

Options:

A.

The default configuration requires you to log in as the admin user.

B.

A factory-default login assigns the hostname Amnesiac to the device.

C.

Most Juniper devices identify the root login prompt using the % character.

D.

Most Juniper devices identify the root login prompt using the > character.

Question 4

Which two criteria should a zone-based security policy include? (Choose two.)

Options:

A.

a source port

B.

a destination port

C.

zone context

D.

an action

Question 5

You are monitoring an SRX Series device that has the factory-default configuration applied.

In this scenario, where are log messages sent by default?

Options:

A.

Junos Space Log Director

B.

Junos Space Security Director

C.

to a local syslog server on the management network

D.

to a local log file named messages

Question 6

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)

Options:

A.

Associate the UTM policy with an address book.

B.

Associate the UTM policy with a firewall filter.

C.

Associate the UTM policy with a security policy.

D.

Associate the UTM feature profile with a UTM policy.

Question 7

When are Unified Threat Management services performed in a packet flow?

Options:

A.

before security policies are evaluated

B.

as the packet enters an SRX Series device

C.

only during the first path process

D.

after network address translation

Question 8

What are two valid address books? (Choose two.)

Options:

A.

66.129.239.128/25

B.

66.129.239.154/24

C.

66.129.239.0/24

D.

66.129.239.50/25

Question 9

You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file.

In this scenario, which command would accomplish this task?

Options:

A.

configure master

B.

cli privileged

C.

configure exclusive

D.

configure

Question 10

You are asked to configure your SRX Series device to block all traffic from certain countries. The solution must be automatically updated as IP prefixes become allocated to those certain countries.

Which Juniper ATP solution will accomplish this task?

Options:

A.

Geo IP

B.

unified security policies

C.

IDP

D.

C&C feed

Question 11

Which statement about global NAT address persistence is correct?

Options:

A.

The same IP address from a source NAT pool will be assigned for all sessions from a given host.

B.

The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.

C.

The same IP address from a destination NAT pool will be assigned for all sessions for a given host.

D.

The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.

Question 12

Which two statements are correct about the default behavior on SRX Series devices? (Choose two.)

Options:

A.

The SRX Series device is in flow mode.

B.

The SRX Series device supports stateless firewalls filters.

C.

The SRX Series device is in packet mode.

D.

The SRX Series device does not support stateless firewall filters.

Question 13

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.

Which NAT type must be used to complete this project?

Options:

A.

source NAT

B.

destination NAT

C.

static NAT

D.

hairpin NAT

Question 14

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

Options:

A.

traffic selector

B.

perfect forward secrecy

C.

st0 interfaces

D.

proxy ID

Question 15

Which two features are included with UTM on an SRX Series device? (Choose two.)

Options:

A.

antivirus

B.

NAT

C.

IDP

D.

content filtering

Question 16

What are two characteristics of a null zone? (Choose two.)

Options:

A.

The null zone is configured by the super user.

B.

By default, all unassigned interfaces are placed in the null zone.

C.

All ingress and egress traffic on an interface in a null zone is permitted.

D.

When an interface is deleted from a zone, it is assigned back to the null zone.

Question 17

Exhibit.

Which two statements are correct referring to the output shown in the exhibit? (Choose two.)

Options:

A.

FTP and ping access for the Trust-DMZ-Access policy is permitted.

B.

FTP and ping access for the Trust-DMZ-Access policy is denied.

C.

The SSH access for the Trust-DMZ-Block policy is permitted.

D.

The SSH access for the Trust-DMZ-Block policy is denied.

Question 18

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the

Internet. You do not want the webservers to initiate connections with external update servers on the Internet using the same IP address as customers use to access them.

Which two NAT types must be used to complete this project? (Choose two.)

Options:

A.

static NAT

B.

hairpin NAT

C.

destination NAT

D.

source NAT

Question 19

Which two security features inspect traffic at Layer 7? (Choose two.)

Options:

A.

IPS/IDP

B.

security zones

C.

application firewall

D.

integrated user firewall

Question 20

In J-Web. the management and loopback address configuration option allows you to configure which area?

Options:

A.

the IP address of the primary Gigabit Ethernet port

B.

the IP address of the Network Time Protocol server

C.

the CIDR address

D.

the IP address of the device management port

Question 21

Which security policy type will be evaluated first?

Options:

A.

A zone policy with no dynamic application set

B.

A global with no dynamic application set

C.

A zone policy with a dynamic application set

D.

A global policy with a dynamic application set

Question 22

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.

Which Juniper ATP feature should you configure to accomplish this task?

Options:

A.

IPsec

B.

static NAT

C.

allowlists

D.

C&C feeds

Question 23

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

Options:

A.

IDP signature feed

B.

C&C cloud feed

C.

infected host cloud feed

D.

US CERT threat feed

Question 24

Which statement is correct about static NAT?

Options:

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Question 25

You are asked to verify that a license for AppSecure is installed on an SRX Series device.

In this scenario, which command will provide you with the required information?

Options:

A.

user@srx> show system license

B.

user@srx> show services accounting

C.

user@srx> show configuration system

D.

user@srx> show chassis firmware

Question 26

What is the default timeout value for TCP sessions on an SRX Series device?

Options:

A.

30 seconds

B.

60 minutes

C.

60 seconds

D.

30 minutes

Question 27

Which statement is correct about unified security policies on an SRX Series device?

Options:

A.

A zone-based policy is always evaluated first.

B.

The most restrictive policy is applied regardless of the policy level.

C.

A global policy is always evaluated first.

D.

The first policy rule is applied regardless of the policy level.

Question 28

What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?

Options:

A.

3

B.

4

C.

2

D.

5

Question 29

Which statement is correct about global security policies on SRX Series devices?

Options:

A.

The to-zone any command configures a global policy.

B.

The from-zone any command configures a global policy.

C.

Global policies are always evaluated first.

D.

Global policies can include zone context.

Question 30

Which two addresses are valid address book entries? (Choose two.)

Options:

A.

173.145.5.21/255.255.255.0

B.

153.146.0.145/255.255.0.255

C.

203.150.108.10/24

D.

191.168.203.0/24

Question 31

The UTM features are performed during which process of the SRX Series device's packet flow?

Options:

A.

services

B.

security policies

C.

zones

D.

screens

Page: 1 / 8
Total 105 questions