New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-232 - Security, Associate (JNCIA-SEC)

Page: 2 / 2
Total 65 questions

You want to use Avira Antivirus.

Which two actions should you perform to satisfy this requirement? (Choose two.)

A.

Restart the management daemon (mgd) to load the components.

B.

Enable the Avira engine in operational mode.

C.

Reboot the SRX Series device to load the components.

D.

Enable the Avira engine in configuration mode.

You want to show the effectiveness of your SRX Series Firewall content filter.

Which operational mode command would you use in this scenario?

A.

show security utm anti-spam status

B.

show security utm anti-virus status

C.

show security web filtering status

D.

show security utm content-filtering statistics

You are asked to create a security policy that controls traffic allowed to pass between the Internet and private security zones. You must ensure that this policy is evaluated before all other policy types on your SRX Series device.

In this scenario, which type of security policy should you create?

A.

routing policy

B.

default policy

C.

zone policy

D.

global policy

Which two statements about global security policies are correct? (Choose two.)

A.

The from-zone and to-zone contexts are not required for a global security policy.

B.

Global security policies require specific zone contexts.

C.

Global policies are processed before zone-based security policies.

D.

You can use both zone-based security policies and global security policies at the same time.

What is transit traffic in the Junos OS?

A.

It is traffic that is processed solely through the forwarding plane.

B.

It is traffic that is rate-limited to prevent denial-of-service attacks.

C.

It is traffic that is processed by the control plane.

D.

It is traffic that requires special handling by the Routing Engine.

What happens if no match is found in both zone-based and global security policies?

A.

The traffic is discarded by the default security policy.

B.

The traffic is redirected to a predefined safe zone.

C.

The traffic is logged for further analysis.

D.

The traffic is allowed by default.

Which two criteria would be used for matching in security policies? (Choose two.)

A.

MAC address

B.

source address

C.

interface name

D.

applications

Click the Exhibit button.

You must ensure that sessions can only be established from the external device.

Referring to the exhibit, which type of NAT is being performed?

A.

destination NAT only

B.

source NAT only

C.

static PAT only

D.

static NAT and source NAT

Click the Exhibit button.

Referring to the exhibit, which two statements are correct about the traffic flow shown in the exhibit? (Choose two.)

A.

There is no change to the original source IP address.

B.

The original source IP address was translated to a new source IP address.

C.

There is no change to the original destination IP address.

D.

The original destination IP address was translated to a new destination IP address.