Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-636 - Security, Professional (JNCIP-SEC)

Page: 2 / 4
Total 115 questions

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

you must find an infected host and where the a􀆩ack came from using the Juniper ATP Cloud. Which two monitor workspaces will return the requested information? (Choose Two)

A.

Hosts

B.

File Scanning

C.

Threat Sources

D.

Encrypted Traffic

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Exhibit:

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

A.

Modify the log-all term to add the next term action

B.

Delete the log-all term

C.

Add a term before the log-all term that blocks Telnet

D.

Apply a firewall filter to the loopback interface that blocks Telnet traffic

All interfaces involved in transparent mode are configured with which protocol family?

A.

mpls

B.

bridge

C.

inet

D.

ethernet — switching

You are connecting two remote sites to your corporate headquarters site. You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?

A.

IPsec ADVPN

B.

hub-and-spoke IPsec VPN

C.

Layer 2 VPN

D.

full mesh Layer 3 VPN with EBGP

You are asked to control access to network resources based on the identity of an authenticated device

Which three steps will accomplish this goal on the SRX Series firewalls? (Choose three )

A.

Configure an end-user-profile that characterizes a device or set of devices

B.

Reference the end-user-profile in the security zone

C.

Reference the end-user-profile in the security policy.

D.

Apply the end-user-profile at the interface connecting the devices

E.

Configure the authentication source to be used to authenticate the device

Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and

only uses a single Phase 2 SA for both sites.

In this scenario, which VPN should be used?

A.

An IPsec group VPN with the corporate firewall acting as the hub device.

B.

Full mesh IPsec VPNs with tunnels between all sites.

C.

A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.

D.

A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.