New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Juniper JN0-334 Dumps Questions Answers

Page: 1 / 3
Total 91 questions

Security, Specialist (JNCIS-SEC) Questions and Answers

Question 1

Which statement is true about JATP incidents?

Options:

A.

Incidents have an associated threat number assigned to them.

B.

Incidents are sorted by category, followed by severity.

C.

Incidents consist of all the events associated with a single threat.

D.

Incidents are always automatically mitigated.

Buy Now
Question 2

What are two valid JIMS event log sources? (Choose two.)

Options:

A.

Microsoft Windows Server 2012 audit logs

B.

Microsoft Active Directory server event logs

C.

Microsoft Exchange Server event logs

D.

Microsoft Active Directory audit logs

Question 3

Which security log message format reduces the consumption of CPU and storage?

Options:

A.

WELF

B.

BSD syslog

C.

binary

D.

structured syslog

Question 4

You want to deploy vSRX in Amazon Web Services (AWS) virtual private clouds (VPCs).

Which two statements are true in this scenario? (Choose two.)

Options:

A.

The vSRX devices serving as local enforcement points for VPCs can be managed by a centralized Junos Space Network Director instance.

B.

MPLS LSPs can be used to connect vSRXs in different VPCs.

C.

IPsec tunnels can be used to connect vSRX in different VPCs.

D.

The vSRX devices serving as local enforcement points for VPCs can be managed by a centralized Junos Space Security Director instance.

Question 5

You are configuring a client-protection SSL proxy profile.

Which statement is correct in this scenario?

Options:

A.

A server certificate is not used but a root certificate authority is used.

B.

A server certificate and root certificate authority are not used.

C.

A server certificate is used but a root certificate authority is not used.

D.

A server certificate and a root certificate authority are both used.

Question 6

What is the default timeout period for a TCP session in the session table of a Junos security device?

Options:

A.

1 minute

B.

60 minutes

C.

15 minutes

D.

30 minutes

Question 7

Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)

Options:

A.

Sky ATP

B.

UTM

C.

JATP

D.

IPS

Question 8

Which two statements are true about virtualized SRX Series devices? (Choose two.)

Options:

A.

vSRX cannot be deployed in transparent mode.

B.

cSRX can be deployed in routed mode.

C.

cSRX cannot be deployed in routed mode.

D.

vSRX can be deployed in transparent mode.

Question 9

Which default protocol and port are used for JIMS to SRX client communication?

Options:

A.

WMI over TCP; port 389

B.

ADSI over TCP; port 389

C.

HTTPS over TCP: port 443

D.

RPC over TCP, port 135

Question 10

What is the default session timeout value for ICMP and UDP traffic?

Options:

A.

30 seconds

B.

30 minutes

C.

60 seconds

D.

5 minutes

Question 11

You are deploying a vSRX into a vSphere environment which applies the configuration from a bootable ISO file containing the juniper.conf file. After the vSRX boots and has the configuration applied, you make additional device specific configuration changes, commit, and reboot the device. Once the device finishes rebooting, you notice the specific changes you made are missing but the original configuration is applied.

In this scenario, what is the problem?

Options:

A.

Configuration changes do not persist after reboots on vSRX.

B.

The juniper.conf file was not applied to the vSRX.

C.

The configuration file is corrupt.

D.

The ISO file is still mounted on the vSRX.

Question 12

Which two statements describe application-layer gateways (ALGs)? (Choose two.)

Options:

A.

ALGs are designed for specific protocols that require multiple sessions.

B.

ALGs are used with protocols that use multiple ports.

C.

ALGs can only be configured using Security Director.

D.

ALGs are designed for specific protocols that use a single TCP session.

Question 13

Which two settings must be enabled on the hypervisor in a vSRX deployment to ensure proper chassis cluster operation? (Choose two.)

Options:

A.

Control links must operate in promiscuous mode.

B.

Control links must have an MTU of 9000.

C.

Fabric links must operate in promiscuous mode.

D.

Fabric links must have an MTU of 9000.

Exam Detail
Vendor: Juniper
Exam Code: JN0-334
Last Update: Dec 27, 2024
JN0-334 Question Answers
Page: 1 / 3
Total 91 questions