Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-636 - Security, Professional (JNCIP-SEC)

Page: 3 / 4
Total 115 questions

You are asked to look at a configuration that is designed to take all traffic with a specific source ip address and forward the

traffic to a traffic analysis server for further evaluation. The configuration is no longer working as intended.

Referring to the exhibit which change must be made to correct the configuration?

A.

Apply the filter as in input filter on interface xe-0/2/1.0

B.

Apply the filter as in input filter on interface xe-0/0/1.0

C.

Create a routing instance named default

D.

Apply the filter as in output filter on interface xe-0/1/0.0

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The configured solution allows IPv6 to IPv4 translation.

B.

The configured solution allows IPv4 to IPv6 translation.

C.

The IPv6 address is invalid.

D.

External hosts cannot initiate contact.

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

A.

Configure the tenant as TSYS1 for the pi security profile.

B.

Configure the tenant as root for the pi security profile.

C.

Configure the tenant as master for the pi security profile.

D.

Configure the tenant as local for the pi security profile

You are requested to enroll an SRX Series device with Juniper ATP Cloud.

Which statement is correct in this scenario?

A.

If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.

B.

The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.

C.

When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period

D.

Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.

which two statements about the configuration shown in the exhibit are correct ?

Exhibit:

A.

The remote IKE gateway IP address is 203.0.113.100.

B.

The local peer is assigned a dynamic IP address.

C.

The local IKE gateway IP address is 203.0.113.100.

D.

The remote peer is assigned a dynamic IP address.

Exhibit

You have recently configured Adaptive Threat Profiling and notice 20 IP address entries in the monitoring section of the Juniper ATP Cloud portal that do not match the number of entries locally on the SRX Series device, as shown in the exhibit.

What is the correct action to solve this problem on the SRX device?

A.

You must configure the DAE in a security policy on the SRX device.

B.

Refresh the feed in ATP Cloud.

C.

Force a manual download of the Proxy__Nodes feed.

D.

Flush the DNS cache on the SRX device.

Which two types of source NAT translations are supported in this scenario? (Choose two.)

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.

The packet is processed as host inbound traffic.

B.

The packet matches the default security policy.

C.

The packet matches a configured security policy.

D.

The packet is processed in the first path packet flow.

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host