Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

JN0-335 Exam Questions Tutorials

Page: 5 / 7
Total 98 questions

Security, Specialist (JNCIS-SEC) Questions and Answers

Question 17

Which method does the loT Security feature use to identify traffic sourced from IoT devices?

Options:

A.

The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud

B.

The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.

C.

The SRX Series device identifies loT devices using their MAC address.

D.

The SRX Series device identifies loT devices from metadata extracted from their transit traffic.

Question 18

Exhibit

Referring to the exhibit which statement is true?

Options:

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Question 19

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.

Which feed will the clients IP address be automatically added to in this situation?

Options:

A.

the command-and-control cloud feed

B.

the allowlist and blocklist feed

C.

the custom cloud feed

D.

the infected host cloud feed

Question 20

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

Options:

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Page: 5 / 7
Total 98 questions