Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Juniper JN0-636 Dumps Questions Answers

Page: 1 / 9
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 1

Exhibit

Referring to the exhibit, an internal host is sending traffic to an Internet host using the 203.0.113.1 reflexive address with source port 54311.

Which statement is correct in this situation?

Options:

A.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

B.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.

C.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

D.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.

Buy Now
Question 2

Which two types of source NAT translations are supported in this scenario? (Choose two.)

Options:

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Question 3

Exhibit

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

Options:

A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

Question 4

Exhibit

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

Options:

A.

IBGP

B.

OSPF

C.

IPsec

D.

DHCP

E.

NTP

Question 5

Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?

Options:

A.

Juniper ATP Cloud

B.

Juniper Secure Analytics

C.

Juniper ATP Appliance

D.

Juniper Security Director

Question 6

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Question 7

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

Options:

A.

The NAT resources must be defined in the security profile for the interconnect logical system.

B.

No resources are needed to be allocated to the interconnect logical system.

C.

The resources must be calculated based on the amount of traffic that will flow between the logical systems.

D.

The flow-session resource must be defined in the security profile for the interconnect logical system.

Question 8

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The SRX-1 device can use the Proxy__Nodes feed in another security policy.

B.

You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.

C.

The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.

D.

You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.

Question 9

Exhibit

Your company recently acquired a competitor. You want to use using the same IPv4 address space as your company.

Referring to the exhibit, which two actions solve this problem? (Choose two)

Options:

A.

Configure static NAT on the SRX Series devices.

B.

Connect the competitor network using IPsec policy-based VPNs.

C.

Identify two neutral IPv4 address spaces for address translation.

D.

Configure IPsec Transport mode.

Question 10

Exhibit

Options:

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Question 11

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Juniper Networks will not investigate false positives generated by this custom feed.

B.

The custom infected hosts feed will not overwrite the Sky ATP infected host’s feed.

C.

The custom infected hosts feed will overwrite the Sky ATP infected host’s feed.

D.

Juniper Networks will investigate false positives generated by this custom feed.

Question 12

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

Options:

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Question 13

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

Options:

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Question 14

Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?

Options:

A.

The number of traffic selectors configured for the VPN.

B.

The number of CoS queues configured for the VPN.

C.

The number of classifiers configured for the VPN.

D.

The number of forwarding classes configured for the VPN.

Question 15

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The c-1 TSYS has a reservation for the security flow resource.

B.

The c-1 TSYS can use security flow resources up to the system maximum.

C.

The c-1 TSYS cannot use any security flow resources.

D.

The c-1 TSYS has no reservation for the security flow resource.

Question 16

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

Options:

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Question 17

Which three type of peer devices are supported for Cos-Based IPsec VPN?

Options:

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

Question 18

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

Question 19

In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)

Options:

A.

Send a custom message

B.

Close the connection.

C.

Drop the connection silently.

D.

Quarantine the host.

Question 20

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

Options:

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Question 21

Exhibit

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This is the last packet in the session.

B.

The SRX Series device is performing both source and destination NAT on this session.

C.

This is the first packet in the session.

D.

The SRX Series device is performing only source NAT on this session.

Question 22

Exhibit

You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated.

Referring to the exhibit, what is a reason for this behavior?

Options:

A.

The C&C events are false positives.

B.

The infected host score is globally set bellow a threat level of 5.

C.

The infected host score is globally set above a threat level of 5.

D.

The ETI events are false positives.

Question 23

You configured a chassis cluster for high availability on an SRX Series device and enrolled this HA cluster with the Juniper ATP Cloud. Which two statements are correct in this scenario? (Choose two.)

Options:

A.

You must use different license keys on both cluster nodes.

B.

When enrolling your devices, you only need to enroll one node.

C.

You must set up your HA cluster after enrolling your devices with Juniper ATP Cloud

D.

You must use the same license key on both cluster nodes.

Question 24

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Question 25

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

Options:

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Question 26

You are connecting two remote sites to your corporate headquarters site. You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?

Options:

A.

IPsec ADVPN

B.

hub-and-spoke IPsec VPN

C.

Layer 2 VPN

D.

full mesh Layer 3 VPN with EBGP

Question 27

Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

Options:

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

Question 28

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

Options:

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Question 29

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

Options:

A.

Mismatched proxy ID

B.

Mismatched peer ID

C.

Mismatched preshared key

D.

Incorrect peer address.

Question 30

you configured a security policy permitting traffic from the trust zone to the untrust zone but your

traffic not hitting the policy.

In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?

Options:

A.

show security policy-report

B.

show security application-tracking counters

C.

show security match-policies

D.

request security policies check

Question 31

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

Options:

A.

A maximum of 32 tenant systems can be configured on a physical SRX device.

B.

All tenant systems share a single routing protocol process.

C.

Each tenant system runs its own instance of the routing protocol process

D.

A maximum of 500 tenant systems can be configured on a physical SRX device.

Question 32

You are asked to provide single sign-on (SSO) to Juniper ATP Cloud. Which two steps accomplish this goal? (Choose two.)

Options:

A.

Configure Microsoft Azure as the service provider (SP).

B.

Configure Microsoft Azure as the identity provider (IdP).

C.

Configure Juniper ATP Cloud as the service provider (SP).

D.

Configure Juniper ATP Cloud as the identity provider (IdP).

Question 33

You are asked to deploy filter-based forwarding on your SRX Series device for incoming traffic sourced from the 10.10 100 0/24 network in this scenario, which three statements are correct? (Choose three.)

Options:

A.

You must create a forwarding-type routing instance.

B.

You must create and apply a firewall filter that matches on the source address 10.10.100.0/24 and then sends this traffic to your routing

C.

You must create and apply a firewall filter that matches on the destination address 10 10.100.0/24 and then sends this traffic to your routing instance.

D.

You must create a RIB group that adds interface routes to your routing instance.

E.

You must create a VRF-type routing instance.

Question 34

SRX Series device enrollment with Policy Enforcer fails To debug further, the user issues the following command show configuration services security—intelligence url

https : //cloudfeeds . argon . juniperaecurity . net/api/manifeat. xml

and receives the following output:

What is the problem in this scenario?

Options:

A.

The device is directly enrolled with Juniper ATP Cloud.

B.

The device is already enrolled with Policy Enforcer.

C.

The SRX Series device does not have a valid license.

D.

Junos Space does not have matching schema based on the

Page: 1 / 9
Total 115 questions