Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

JN0-636 Security Professional (JNCIP-SEC) Questions and Answers

Questions 4

You are asked to download and install the IPS signature database to a device operating in chassis cluster mode. Which statement is correct in this scenario?

Options:

A.

You must download and install the IPS signature package on the primary node.

B.

The first synchronization of the backup node and the primary node must be performed manually.

C.

The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node must be rebooted.

D.

The IPS signature package must be downloaded and installed on the primary and backup nodes.

Buy Now
Questions 5

Exhibit

You are using trace options to verity NAT session information on your SRX Series device

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This packet is part of an existing session.

B.

The SRX device is changing the source address on this packet from

C.

This is the first packet in the session

D.

The SRX device is changing the destination address on this packet 10.0.1 1 to 172 20.101.10.

Buy Now
Questions 6

What are two important function of the Juniper Networks ATP appliance solution? (Choose two.).

Options:

A.

Statistics

B.

Analysis

C.

Detection

D.

Filtration

Buy Now
Questions 7

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

Options:

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Buy Now
Questions 8

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Options:

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Buy Now
Questions 9

Exhibit

Referring to the exhibit, which statement is true?

Options:

A.

This custom block list feed will be used before the Juniper Seclntel

B.

This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.

C.

This custom block list feed will be used instead of the Juniper Seclntel block list feed

D.

This custom block list feed will be used after the Juniper Seclntel block list feed.

Buy Now
Questions 10

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Buy Now
Questions 11

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

Options:

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Buy Now
Questions 12

you must create a secure fabric in your company’s network

In this Scenario, Which three statements are correct? (Choose Three)

Options:

A.

MX Series device associated with tenants can belong to only one site

B.

A switch must be assigned to the site to enforce an infected host policy within the network

C.

SRX Series devices can belong to multiple sites

D.

SRX Series devices can belong to only one site

E.

Switches and connectors cannot be added to the same site

Buy Now
Questions 13

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 14

Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds.

Which two Juniper devices work in this situation? (Choose two)

Options:

A.

EX Series devices

B.

MX Series devices

C.

SRX Series devices

D.

QFX Series devices

Buy Now
Questions 15

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Buy Now
Questions 16

You have designed the firewall filter shown in the exhibit to limit SSH control traffic to yours SRX Series device without affecting other traffic.

Which two statement are true in this scenario? (Choose two.)

Options:

A.

The filter should be applied as an output filter on the loopback interface.

B.

Applying the filter will achieve the desired result.

C.

Applying the filter will not achieve the desired result.

D.

The filter should be applied as an input filter on the loopback interface.

Buy Now
Questions 17

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

Options:

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Buy Now
Questions 18

Which two log format types are supported by the JATP appliance? (Choose two.)

Options:

A.

YAML

B.

XML

C.

CSV

D.

YANG

Buy Now
Questions 19

Exhibit.

A hub member of an ADVPN is not functioning correctly.

Referring the exhibit, which action should you take to solve the problem?

Options:

A.

[edit interfaces]

root@vSRX-1# delete st0.0 multipoint

B.

[edit interfaces]

user@hub-1# delete ipsec vpn advpn-vpn traffic-selector

C.

[edit security]

user@hub-1# set ike gateway advpn-gateway advpn suggester disable

D.

[edit security]

user@hub-1# delete ike gateway advpn-gateway advpn partner

Buy Now
Questions 20

You want to enforce I DP policies on HTTP traffic.

In this scenario, which two actions must be performed on your SRX Series device? (Choose two )

Options:

A.

Choose an attacks type in the predefined-attacks-group HTTP-All.

B.

Disable screen options on the Untrust zone.

C.

Specify an action of None.

D.

Match on application junos-http.

Buy Now
Questions 21

Which two types of source NAT translations are supported in this scenario? (Choose two.)

Options:

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Buy Now
Questions 22

Exhibit

Options:

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Buy Now
Questions 23

Which two features would be used for DNS doctoring on an SRX Series firewall? (Choose two.)

Options:

A.

The DNS ALG must be enabled.

B.

static NAT

C.

The DNS ALG must be disabled.

D.

source NAT

Buy Now
Questions 24

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

Options:

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Buy Now
Questions 25

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Buy Now
Questions 26

You are asked to provide single sign-on (SSO) to Juniper ATP Cloud. Which two steps accomplish this goal? (Choose two.)

Options:

A.

Configure Microsoft Azure as the service provider (SP).

B.

Configure Microsoft Azure as the identity provider (IdP).

C.

Configure Juniper ATP Cloud as the service provider (SP).

D.

Configure Juniper ATP Cloud as the identity provider (IdP).

Buy Now
Questions 27

Exhibit

Referring to the exhibit, an internal host is sending traffic to an Internet host using the 203.0.113.1 reflexive address with source port 54311.

Which statement is correct in this situation?

Options:

A.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

B.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.

C.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

D.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.

Buy Now
Questions 28

Exhibit:

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

Options:

A.

Modify the log-all term to add the next term action

B.

Delete the log-all term

C.

Add a term before the log-all term that blocks Telnet

D.

Apply a firewall filter to the loopback interface that blocks Telnet traffic

Buy Now
Questions 29

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The c-1 TSYS has a reservation for the security flow resource.

B.

The c-1 TSYS can use security flow resources up to the system maximum.

C.

The c-1 TSYS cannot use any security flow resources.

D.

The c-1 TSYS has no reservation for the security flow resource.

Buy Now
Questions 30

Refer to the exhibit,

which two potential violations will generate alarm ? (Choose Two)

Options:

A.

the number of policy violations by a source network identifier

B.

the ratio of policy violation traffic compared to accepted traffic.

C.

the number of policy violation by a destination TCP port

D.

the number of policy violation to an application within a specified period

Buy Now
Questions 31

You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and

only uses a single Phase 2 SA for both sites.

In this scenario, which VPN should be used?

Options:

A.

An IPsec group VPN with the corporate firewall acting as the hub device.

B.

Full mesh IPsec VPNs with tunnels between all sites.

C.

A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.

D.

A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.

Buy Now
Questions 32

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

Options:

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Buy Now
Questions 33

Exhibit

Which statement is true about the output shown in the exhibit?

Options:

A.

The SRX Series device is configured with default security forwarding options.

B.

The SRX Series device is configured with packet-based IPv6 forwarding options.

C.

The SRX Series device is configured with flow-based IPv6 forwarding options.

D.

The SRX Series device is configured to disable IPv6 packet forwarding.

Buy Now
Questions 34

your company wants to take your juniper ATP appliance into private mode. You must give them a list

of impacted features for this request.

Which two features are impacted in this scenario? (Choose two)

Options:

A.

False Positive Reporting

B.

Threat Progression Monitoring

C.

GSS Telemetry

D.

Cyber Kill Chain mapping

Buy Now
Exam Code: JN0-636
Exam Name: Security Professional (JNCIP-SEC)
Last Update: May 8, 2024
Questions: 115
JN0-636 pdf

JN0-636 PDF

$28  $80
JN0-636 Engine

JN0-636 Testing Engine

$33.25  $95
JN0-636 PDF + Engine

JN0-636 PDF + Testing Engine

$45.5  $130