Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Juniper JN0-636 - Security, Professional (JNCIP-SEC)

Page: 1 / 4
Total 115 questions

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

A.

WELF

B.

JSON

C.

CEF

D.

binay

your company wants to take your juniper ATP appliance into private mode. You must give them a list

of impacted features for this request.

Which two features are impacted in this scenario? (Choose two)

A.

False Positive Reporting

B.

Threat Progression Monitoring

C.

GSS Telemetry

D.

Cyber Kill Chain mapping

Exhibit:

Referring to the exhibit, the operator user is unable to save configuration files to a usb stick the is

plugged into SRX. What should you do to solve this problem?

A.

Add the floppy permission flag to the operations class

B.

Add the system-control permission flag to the operation class

C.

Add the interface-control permission flag to the operation class

D.

Add the system permission flag to the operation class

What is the purpose of the Switch Microservice of Policy Enforcer?

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

You want to identify potential threats within SSL-encrypted sessions without requiring SSL proxy to decrypt the session contents. Which security feature achieves this objective?

A.

infected host feeds

B.

encrypted traffic insights

C.

DNS security

D.

Secure Web Proxy

Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds.

Which two Juniper devices work in this situation? (Choose two)

A.

EX Series devices

B.

MX Series devices

C.

SRX Series devices

D.

QFX Series devices

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Exhibit

Referring to the exhibit, an internal host is sending traffic to an Internet host using the 203.0.113.1 reflexive address with source port 54311.

Which statement is correct in this situation?

A.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

B.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.

C.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

D.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.