Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

JNCIP-SEC JN0-636 Reddit Questions

Page: 2 / 9
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 5

Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?

Options:

A.

Juniper ATP Cloud

B.

Juniper Secure Analytics

C.

Juniper ATP Appliance

D.

Juniper Security Director

Question 6

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Question 7

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

Options:

A.

The NAT resources must be defined in the security profile for the interconnect logical system.

B.

No resources are needed to be allocated to the interconnect logical system.

C.

The resources must be calculated based on the amount of traffic that will flow between the logical systems.

D.

The flow-session resource must be defined in the security profile for the interconnect logical system.

Question 8

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The SRX-1 device can use the Proxy__Nodes feed in another security policy.

B.

You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.

C.

The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.

D.

You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.

Page: 2 / 9
Total 115 questions