Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release JN0-636 JNCIP-SEC Questions

Page: 4 / 9
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 13

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

Options:

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Question 14

Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?

Options:

A.

The number of traffic selectors configured for the VPN.

B.

The number of CoS queues configured for the VPN.

C.

The number of classifiers configured for the VPN.

D.

The number of forwarding classes configured for the VPN.

Question 15

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The c-1 TSYS has a reservation for the security flow resource.

B.

The c-1 TSYS can use security flow resources up to the system maximum.

C.

The c-1 TSYS cannot use any security flow resources.

D.

The c-1 TSYS has no reservation for the security flow resource.

Question 16

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

Options:

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Page: 4 / 9
Total 115 questions