JN0-1332 Dumps

JN0-1332 Braindumps JN0-1332 Real Questions JN0-1332 Practice Test

JN0-1332 Actual Questions


Juniper


JN0-1332


Security Design, Specialist (JNCDS-SEC)


https://killexams.com/pass4sure/exam-detail/JN0-1332

Question: 214


Which two statements describe Juniper ATP Cloud? (Choose two)


  1. Juniper ATP Cloud can use a sandbox to detect threats that use evasion techniques.

  2. Juniper ATP Cloud runs mime with network traffic to Nock all traffic before reaching endpoint.

  3. Juniper ATP Cloud provides protection against zero-day threats

  4. Juniper ATP Cloud is an added app that must be instated with Security Director


Answer: A,D Question: 215

Physical security devices are ''blind'' to which type of traffic?


  1. bare metal server to VM

  2. private VLAN

  3. intra-server traffic

  4. management


Answer: B Question: 216

Which technology enables IPS inspection for users browsing websites that use Transport Layer Security (TLS)?


  1. SSL reverse proxy

  2. defense in-depth

  3. SSL forward proxy

  4. screens


Answer: C Question: 217

You must implement a solution to deploy end-to-end security services on network elements. Which solution will accomplish this task?

  1. Security Director

  2. Network Director

  3. JSA

  4. SRX Series devices


Answer: C Question: 218

You are asked to implement Jumper AppSecure to increase application security. You want to analyze specific application usage In this scenario.


Which AppSecure feature would accomplish this task?

  1. AppQoS

  2. AppTrack

  3. AppFW

  4. IDP/IP


Answer: D Question: 219

Which two statements are true about WAN security considerations? (Choose two.)


  1. MACsec increases protection on alt WAN types

  2. Provider VPN circuit require iPsec

  3. internal connections are susceptible to fragmentation

  4. IPsec increases protection on all WAN types


Answer: C Question: 220

You are designing a security solution that includes SRX Series firewalls in a chassis cluster. In this scenario. which two dements must be part of the design? (Choose two.)

  1. The physical interface on each SRX Series device making up the reth interface must be in the same L2 domain

  2. The physical interface on each SRX Series device making up the reth interface must be in separate L2 domains

  3. The duster ID must be the same on both SRX Series devices

  4. The node 10 must be the same on both SRX Series devices


Answer: B Question: 221

When designing the security for a service provider core router, you are asked to add a firewall fitter on the to0 interface in this scenario, which two protocols would you want to allow through the filter? (Choose two.)


  1. LLDP

  2. SSH

  3. BGP

  4. STP


Answer: A,C Question: 222

Which automation language would you use to create on-box and off-box scripts for SRX Series devices?


  1. Python

  2. Pert

  3. Java

  4. Ruby

Answer: D Question: 223

Which three statements about Group VPNs #e true? (Choose three.)


  1. The IP pay load is encrypted

  2. Data can flow directly between sites without transiting a central hub

  3. Group VPNs use a client/server architecture

  4. All data transits through a central hub

  5. The IP headers are encrypted


Answer: A,C,D Question: 224

You want to reduce the possibility of your data center's server becoming an unwilling participant in a DDoS attack When tvA3 features should you use on your SRX Series devices to satisfy this requirement? (Choose two.)


  1. dynamic IPsec tunnels

  2. Juniper ATP Cloud GeolP

  3. UTMWebtaering

  4. Juniper ATP Cloud CC feeds


Answer: A,D Question: 225

When using Contra! networking, security policies are distributed as access control list to which component?


  1. vSwith

  2. vSRX

  3. vMX

  4. vRouter


Answer: D Question: 226 Exhibit.



In the 3-tier VPN design shown in the exhibit, which function are the Campus A and Campus B SRX Series devices performing?


  1. Internet security gateway

  2. data center firewall

  3. WAN aggregation

  4. VPN bridging


Answer: A Question: 227

Which statement about Junos firewall filters is correct?


  1. Firewall filters can be applied as a security policy action

  2. Firewall filters do not operate on stateful flows and they serve no purpose in a next-generation firewall

  3. Firewall filters can be applied as the packet enters the security device, and they are stateless.

  4. Firewall filters are applied to TCP packets only. and they do not block UDP pockets


Answer: B Question: 228

According to Juniper Networks, what are two focus points when designing a secure network? (Choose two.)


  1. performance

  2. automation

  3. distributed control

  4. classification


Answer: A,D

Question: 229


You arc designing a high availability firewall solution You select an off-path design instead of an mime design. What arc two reasons for this decision? (Choose two.)

  1. The off-path design is less complex

  2. The off-path design is more flexible

  3. The off-path design uses fewer interfaces at the adjacency layer

  4. The off-path design requires a proper routing configuration for selecting traffic


Answer: B Question: 230

You are designing a security solution for an existing data center. All traffic most be secured using SRX Series devices, however, you are unable to change the existing IP addressing scheme.


Which firewall deployment method satisfies this requirement?


  1. transparent deployment

  2. two-arm deployment

  3. one-arm deployment

  4. inline deployment


Answer: A Question: 231

You are asked to enable denial of service protection for a webserver behind an SRX Series device In this scenario, which feature would you enable?


  1. screens

  2. App Secure

  3. Web filtering

  4. Juniper ATP


Answer: D Question: 232

Which solution would you deploy to accomplish this task?


  1. Junes Space Log Director

  2. Juniper Networks Central insights

  3. Junos Space Security Director

  4. Juniper Networks Secure Analytics


Answer: A Question: 233

In yew network design, you must include a method to block IP addresses from certain countries that will automatically update within the SRX Series devices' security policies.


Which technology would accomplish this goal?


  1. UTM

  2. GeolP

  3. dynamic DNS

  4. IPS


Answer: C