Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Juniper JN0-335 - Security, Specialist (JNCIS-SEC)

Page: 1 / 3
Total 98 questions

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

What are two requirements for enabling AppQoE? (Choose two.)

A.

You need two SRX Series device endpoints.

B.

You need two SRX Series or MX Series device endpoints.

C.

You need an APPID feature license.

D.

You need to configure AppQoE for reverse traffic.

Exhibit

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

A.

Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.

B.

Execute the Junos commit full command to override the error and apply the configuration.

C.

Create a custom application named http at the [edit applications] hierarchy.

D.

Modify the security policy to use the built-in Junos-http applications.

A.

IPS is integrated as a security service on SRX Series devices.

B.

IPS uses sandboxinQ to detect unknown attacks.

C.

IPS is a standalone platform running on dedicated hardware or as a virtual device.

D.

IPS uses protocol anomaly rules to detect unknown attacks.

Regarding static attack object groups, which two statements are true? (Choose two.)

A.

Matching attack objects are automatically added to a custom group.

B.

Group membership automatically changes when Juniper updates the IPS signature database.

C.

Group membership does not automatically change when Juniper updates the IPS signature database.

D.

You must manually add matching attack objects to a custom group.

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

A.

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.

B.

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.

C.

JIMS domain PC probes are triggered to map usernames to group membership information.

D.

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.

Exhibit

You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.

Which statement is correct in this scenario?

A.

The security intelligence policy must be configured; on a unified security policy

B.

Use the commit full command to start the download.

C.

No action is required, the feeds take a few minutes to download.

D.

Set the maximum C&C entries within the Juniper ATP Cloud GUI.

On which three Hypervisors is vSRX supported? (Choose three.)

A.

VMware ESXi

B.

Citrix Hypervisor

C.

Hyper-V

D.

KVM

E.

Oracle VM

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

A.

In the vSwitch security settings, accept promiscuous mode.

B.

In the vSwitch properties settings, set the VLAN ID to None.

C.

In the vSwitch security settings, reject forged transmits.

D.

In the vSwitch security settings, reject MAC address changes.