Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two statements are true about the vSRX? (Choose two.)

A.

AWS is supported as an laaS solution.

B.

AWS is not supported as an laaS solution.

C.

OpenStack is not supported as a cloud orchestration solution.

D.

OpenStack is supported as a cloud orchestration solution.

Full Access
Question # 5

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Full Access
Question # 6

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Full Access
Question # 7

When a security policy is modified, which statement is correct about the default behavior for active sessions allowed by that policy?

A.

The active sessions allowed by the policy will be dropped.

B.

Only policy changes that involve modification of the action field will cause the active sessions affected by the change to be dropped.

C.

Only policy changes that involve modification of the application will cause the active sessions affected by the change to be dropped.

D.

The active sessions allowed by the policy will continue unchanged.

Full Access
Question # 8

You are configuring logging for a security policy.

In this scenario, in which two situations would log entries be generated? (Choose two.)

A.

every 10 minutes

B.

at session initialization

C.

every 60 seconds

D.

at session close

Full Access
Question # 9

Which two statements are correct about Juniper ATP Cloud? (Choose two.)

A.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.

B.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats levels range from 0 to 10 minutes.

C.

The threat levels range from 0-10.

D.

The threat levels range from 0-100.

Full Access
Question # 10

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

A.

In the vSwitch security settings, accept promiscuous mode.

B.

In the vSwitch properties settings, set the VLAN ID to None.

C.

In the vSwitch security settings, reject forged transmits.

D.

In the vSwitch security settings, reject MAC address changes.

Full Access
Question # 11

Which two statements are true about Juniper ATP Cloud? (Choose two.)

A.

Juniper ATP Cloud only uses one antivirus software package to analyze files.

B.

Juniper ATP Cloud uses multiple antivirus software packages to analyze files.

C.

Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.

D.

Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.

Full Access
Question # 12

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

A.

scalability

B.

no required software license

C.

granular security

D.

infinite number of interfaces

Full Access
Question # 13

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Full Access
Question # 14

Exhibit

You are asked to ensure that servers running the Ubuntu OS will not be able to update automatically by blocking their access at the SRX firewall. You have configured a unified security policy named Blockuburrtu, but it is not blocking the updates to the OS.

Referring to the exhibit which statement will block the Ubuntu OS updates?

A.

Move the Blockubuntu policy after the Allowweb policy.

B.

Configure the Blockubuntu policy with the junos-https application parameter.

C.

Change the default policy to permit-all.

D.

Configure the Allowweb policy to have a dynamic application of any.

Full Access
Question # 15

Click the Exhibit button.

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Full Access
Question # 16

What are two requirements for enabling AppQoE? (Choose two.)

A.

You need two SRX Series device endpoints.

B.

You need two SRX Series or MX Series device endpoints.

C.

You need an APPID feature license.

D.

You need to configure AppQoE for reverse traffic.

Full Access
Question # 17

Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)

A.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are maintained

B.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are dropped.

C.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are dropped.

D.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are reevaluated.

Full Access
Question # 18

Click the Exhibit button.

Which two statements describe the output shown in the exhibit? (Choose two.)

A.

Redundancy group 1 experienced an operational failure.

B.

Redundancy group 1 was administratively failed over.

C.

Node 0 is controlling traffic for redundancy group 1.

D.

Node 1 is controlling traffic for redundancy group 1.

Full Access
Question # 19

Which sequence does an SRX Series device use when implementing stateful session security policies using Layer 3 routes?

A.

An SRX Series device will perform a security policy search before conducting a longest-match Layer 3 route table lookup.

B.

An SRX Series device performs a security policy search before implementing an ALG security check on the longest-match Layer 3 route.

C.

An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search.

D.

An SRX Series device conducts an ALG security check on the longest-match route before performing a security policy search.

Full Access
Question # 20

Which two statements are correct about AppTrack? (Choose two.)

A.

AppTrack can be configured for any defined logical system on an SRX Series device.

B.

AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.

C.

AppTrack collects traffic flow information including byte, packet, and duration statistics.

D.

AppTrack can only be configured in the main logical system on an SRX Series device.

Full Access
Question # 21

You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.

Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?

A.

AppFW

B.

SIP ALG

C.

AppQoE

D.

AppQoS

Full Access
Question # 22

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.

The fab interface enables configuration synchronization.

D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Full Access
Question # 23

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

A.

Web proxy

B.

client-protection

C.

server-protection

D.

DNS proxy

Full Access
Question # 24

Which two statements about SRX Series device chassis clusters are true? (Choose two.)

A.

Redundancy group 0 is only active on the cluster backup node.

B.

Each chassis cluster member requires a unique cluster ID value.

C.

Each chassis cluster member device can host active redundancy groups

D.

Chassis cluster member devices must be the same model.

Full Access
Question # 25

You want to set up JSA to collect network traffic flows from network devices on your network.

Which two statements are correct when performing this task? (Choose two.)

A.

BGP FlowSpec is used to collect traffic flows from Junos OS devices.

B.

Statistical sampling increases processor utilization

C.

Statistical sampling decreases event correlation accuracy.

D.

Superflows reduce traffic licensing requirements.

Full Access
Question # 26

Which solution enables you to create security policies that include user and group information?

A.

JIMS

B.

ATP Appliance

C.

Network Director

D.

NETCONF

Full Access
Question # 27

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

A.

Enable AppQoS on the proper security zones

B.

Enable APBR on the proper security zones

C.

Enable screen options on the proper security zones

D.

Enable AppTrack on the proper security zones.

Full Access
Question # 28

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

A.

building blocks

B.

assets

C.

events

D.

tests

Full Access
Question # 29

Exhibit

Referring to the exhibit which statement is true?

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Full Access