Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

JN0-335 Security - Specialist (JNCIS-SEC) Questions and Answers

Questions 4

You want to deploy a virtualized SRX in your environment.

In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)

Options:

A.

The vSRX supports Layer 2 and Layer 3 configurations.

B.

Only the vSRX provides clustering.

C.

The vSRX has faster boot times.

D.

Only the vSRX provides NAT, IPS, and UTM services

Buy Now
Questions 5

Which two statements about SRX Series device chassis clusters are correct? (Choose two.)

Options:

A.

The chassis cluster data plane is connected with revenue ports.

B.

The chassis cluster can contain a maximum of three devices.

C.

The chassis cluster data plane is connected with SPC ports.

D.

The chassis cluster can contain a maximum of two devices.

Buy Now
Questions 6

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.

Adaptive Threat Profiling

B.

Juniper Secure Analytics

C.

Juniper Identity Management Service

D.

Intrusion Prevention System

Buy Now
Questions 7

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Buy Now
Questions 8

Which two statements about SRX Series device chassis clusters are true? (Choose two.)

Options:

A.

Redundancy group 0 is only active on the cluster backup node.

B.

Each chassis cluster member requires a unique cluster ID value.

C.

Each chassis cluster member device can host active redundancy groups

D.

Chassis cluster member devices must be the same model.

Buy Now
Questions 9

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

Options:

A.

Web proxy

B.

client-protection

C.

server-protection

D.

DNS proxy

Buy Now
Questions 10

Click the Exhibit button.

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Buy Now
Questions 11

Exhibit

You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.

Which statement is correct in this scenario?

Options:

A.

The security intelligence policy must be configured; on a unified security policy

B.

Use the commit full command to start the download.

C.

No action is required, the feeds take a few minutes to download.

D.

Set the maximum C&C entries within the Juniper ATP Cloud GUI.

Buy Now
Questions 12

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Buy Now
Questions 13

Which two statements are true about mixing traditional and unified security policies? (Choose two.)

Options:

A.

When a packet matches a unified security policy, the evaluation process terminates

B.

Traditional security policies must come before unified security policies

C.

Unified security policies must come before traditional security policies

D.

When a packet matches a traditional security policy, the evaluation process terminates

Buy Now
Questions 14

Exhibit

Referring to the exhibit, what do you determine about the status of the cluster.

Options:

A.

Both nodes determine that they are in a primary state.

B.

Node 1 is down

C.

Node 2 is down.

D.

There are no issues with the cluster.

Buy Now
Questions 15

Which two statements about the DNS ALG are correct? (Choose two.)

Options:

A.

The DNS ALG supports DDNS.

B.

The DNS ALG supports VPN tunnels.

C.

The DNS ALG performs DNS doctoring.

D.

The DNS ALG does not support NAT.

Buy Now
Questions 16

You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.

In this scenario, what is the correct order for rebooting the devices?

Options:

A.

Reboot the secondary device, then the primary device.

B.

Reboot only the secondary device since the primary will assign itself the correct cluster and node ID.

C.

Reboot the primary device, then the secondary device.

D.

Reboot only the primary device since the secondary will assign itself the correct cluster and node ID.

Buy Now
Questions 17

Which two statements are correct about a reth LAG? (Choose two.)

Options:

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Buy Now
Questions 18

Which solution enables you to create security policies that include user and group information?

Options:

A.

JIMS

B.

ATP Appliance

C.

Network Director

D.

NETCONF

Buy Now
Questions 19

Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)

Options:

A.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are maintained

B.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are dropped.

C.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are dropped.

D.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are reevaluated.

Buy Now
Questions 20

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

Options:

A.

Enable AppQoS on the proper security zones

B.

Enable APBR on the proper security zones

C.

Enable screen options on the proper security zones

D.

Enable AppTrack on the proper security zones.

Buy Now
Questions 21

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

Options:

A.

AppTrack

B.

AppQoS

C.

AppFW

D.

APPID

Buy Now
Questions 22

Which two statements are true about application identification? (Choose two.)

Options:

A.

Application identification can identity nested applications that are within Layer 7.

B.

Application identification cannot identify nested applications that are within Layer 7.

C.

Application signatures are the same as IDP signatures.

D.

Application signatures are not the same as IDP signatures.

Buy Now
Questions 23

You need to deploy an SRX Series device in your virtual environment.

In this scenario, what are two benefits of using a CSRX? (Choose two.)

Options:

A.

The cSRX supports Layer 2 and Layer 3 deployments.

B.

The cSRX default configuration contains three default zones: trust, untrust, and management.

C.

The cSRX supports firewall, NAT, IPS, and UTM services.

D.

The cSRX has low memory requirements.

Buy Now
Questions 24

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.

Which Juniper Networks solution will accomplish this task?

Options:

A.

JIMS

B.

Encrypted Traffic Insights

C.

UTM

D.

Adaptive Threat Profiling

Buy Now
Questions 25

Exhibit

When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)

Options:

A.

The SSL proxy certificate ID is part of a blocklist.

B.

The SSL proxy certificate ID does not have the correct renegotiation option set.

C.

The SSL proxy certificate ID is for a forwarding proxy.

D.

The SSL proxy certificate ID does not exist.

Buy Now
Questions 26

You administer a JSA host and want to include a rule that sets a threshold for excessive firewall denies and sends an SNMP trap after receiving related syslog messages from an SRX Series firewall.

Which JSA rule type satisfies this requirement?

Options:

A.

common

B.

offense

C.

flow

D.

event

Buy Now
Questions 27

Click the Exhibit button.

Which two statements describe the output shown in the exhibit? (Choose two.)

Options:

A.

Redundancy group 1 experienced an operational failure.

B.

Redundancy group 1 was administratively failed over.

C.

Node 0 is controlling traffic for redundancy group 1.

D.

Node 1 is controlling traffic for redundancy group 1.

Buy Now
Questions 28

Which two statements about SRX chassis clustering are correct? (Choose two.)

Options:

A.

SRX chassis clustering supports active/passive and active/active for the data plane.

B.

SRX chassis clustering only supports active/passive for the data plane.

C.

SRX chassis clustering supports active/passive for the control plane.

D.

SRX chassis clustering supports active/active for the control plane.

Buy Now
Questions 29

You have deployed an SRX300 Series device and determined that files have stopped being scanned.

In this scenario, what is a reason for this problem?

Options:

A.

The software license is a free model and only scans executable type files.

B.

The infected host communicated with a command-and-control server, but it did not download malware.

C.

The file is too small to have a virus.

D.

You have exceeded the maximum files submission for your SRX platform size.

Buy Now
Exam Code: JN0-335
Exam Name: Security - Specialist (JNCIS-SEC)
Last Update: May 16, 2024
Questions: 98
JN0-335 pdf

JN0-335 PDF

$28  $80
JN0-335 Engine

JN0-335 Testing Engine

$33.25  $95
JN0-335 PDF + Engine

JN0-335 PDF + Testing Engine

$45.5  $130