New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-232 - Security, Associate (JNCIA-SEC)

Page: 1 / 2
Total 65 questions

You are modifying the NAT rule order and you notice that a new NAT rule has been added to the bottom of the list.

In this situation, which command would you use to reorder NAT rules?

A.

top

B.

run

C.

up

D.

insert

What are two ways that an SRX Series device identifies content? (Choose two.)

A.

It identifies and inspects the file extension of each file.

B.

It uses AppID.

C.

It identifies file types in HTTP, FTP, and e-mail protocols.

D.

It uses ALGs.

You want to enable NextGen Web Filtering in SRX Series devices.

In this scenario, which two actions will accomplish this task? (Choose two.)

A.

Generate a CA-signed certificate.

B.

Generate a self-signed certificate.

C.

Configure an SSL initiation profile.

D.

Configure an SSL proxy profile.

You have created a series of security policies permitting access to a variety of services. You now want to create a policy that blocks access to all other services for all user groups.

What should you create in this scenario?

A.

global security policy

B.

Juniper ATP policy

C.

IDP policy

D.

integrated user firewall policy

Click the Exhibit button.

Referring to the exhibit, which statement is correct?

A.

policy3 will be shadowed because it matches the same application as policy1.

B.

None of the policies will be shadowed.

C.

policy1 will be shadowed because it matches the same application as policy3.

D.

policy2 will be shadowed because it matches the same application as policy1.

A new packet arrives on an interface on your SRX Series Firewall that is assigned to the trust security zone.

In this scenario, how does the SRX Series Firewall determine the egress security zone?

A.

by performing a session lookup

B.

by examining the destination port

C.

by performing a route lookup

D.

by examining the ingress security zone properties

In which order does Junos OS process the various forms of NAT?

A.

static NAT, destination NAT, source NAT

B.

destination NAT, source NAT, static NAT

C.

source NAT, static NAT, destination NAT

D.

source NAT, destination NAT, static NAT

Which statement is correct about capturing transit packets on an SRX Series Firewall?

A.

You can capture transit packets on the egress interface using a firewall filter.

B.

You can capture transit packets by using a firewall filter on the loopback interface.

C.

You can capture transit packets by using the tcpdump utility in the shell.

D.

You can capture transit packets using sampling and port mirroring.

Click the Exhibit button.

The exhibit shows a table representing security policies from the trust zone to the untrust zone.

In this scenario, which two statements are correct? (Choose two.)

A.

SSH requests from the source IP address of 172.25.11.10 are permitted to the destination IP address of 10.1.0.10.

B.

Ping command requests from the source IP address of 172.25.11.100 are denied to the destination IP address of 10.1.0.10.

C.

FTP requests from the source IP address of 10.1.0.10 are permitted to the destination IP address of 172.25.11.100.

D.

FTP requests from the source IP address of 172.25.11.11 are denied to the destination IP address of 10.1.0.10.

What must also be enabled when using source NAT if the address pool is in the same subnet as the interface?

A.

static NAT

B.

dynamic DNS

C.

destination NAT

D.

proxy ARP