Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Juniper JN0-637 - Security, Professional (JNCIP-SEC)

Page: 3 / 4
Total 115 questions

What are three core components for enabling advanced policy-based routing? (Choose three.)

A.

Filter-based forwarding

B.

Routing options

C.

Routing instance

D.

APBR profile

E.

Policies

Exhibit:

You have configured a CoS-based VPN that is not functioning correctly.

Referring to the exhibit, which action will solve the problem?

A.

You must delete one forwarding class.

B.

You must change the loss priorities of the forwarding classes to low.

C.

You must use inet precedence instead of DSCP.

D.

You must change the code point for the DB-data forwarding class to 10000.

Referring to the exhibit,

which three statements about the multinode HA environment are true? (Choose three.)

A.

Two services redundancy groups are available.

B.

IP monitoring has failed for the services redundancy group.

C.

Node 1 will host services redundancy group 1 unless it is unavailable.

D.

Session state is synchronized on both nodes.

E.

Node 2 will process transit traffic that it receives for services redundancy group 1.

Which two statements are correct about advanced policy-based routing?

A.

It can use the application system cache to route traffic.

B.

The associated routing instance should be configured as a virtual router instance.

C.

It cannot use the application system cache to route traffic.

D.

The associated routing instance should be configured as a forwarding instance.

Referring to the exhibit,

which two statements about User1 are true? (Choose two.)

A.

User1 has access to the configuration specific to their assigned logical system.

B.

User1 is logged in to logical system LSYS-1.

C.

User1 can add logical units to an interface that a primary administrator has not previously assigned.

D.

User1 can view outputs from other user logical systems.

Exhibit:

You are having problems configuring advanced policy-based routing.

What should you do to solve the problem?

A.

Apply a policy to the APBR RIB group to only allow the exact routes you need.

B.

Change the routing instance to a forwarding instance.

C.

Change the routing instance to a virtual router instance.

D.

Remove the default static route from the main instance configuration.

You are asked to see if your persistent NAT binding table is exhausted.

Which show command would you use to accomplish this task?

A.

show security nat source persistent-nat-table summary

B.

show security nat source summary

C.

show security nat source pool all

D.

show security nat source persistent-nat-table all

In a multinode HA environment, which service must be configured to synchronize between nodes?

A.

Advanced policy-based routing

B.

PKI certificates

C.

IPsec VPN

D.

IDP

You have deployed automated threat mitigation using Security Director with Policy Enforcer, Juniper ATP Cloud, SRX Series devices, and EX Series switches.

In this scenario, which device is responsible for blocking the infected hosts?

A.

Policy Enforcer

B.

Security Director

C.

Juniper ATP Cloud

D.

EX Series switch

Exhibit:

You are asked to ensure that Internet users can access the company's internal webserver using its FQDN. However, the internal DNS server's A record only points to the webserver's private address.

Referring to the exhibit, which two actions are required to complete this task? (Choose two.)

A.

Disable the DNS ALG.

B.

Configure static NAT for both the DNS server and the webserver.

C.

Configure destination NAT for both the DNS server and the webserver.

D.

Configure proxy ARP on ge-0/0/3.