image


JN0-322 Dumps

JN0-322 Braindumps JN0-322 Real Questions JN0-322 Practice Test

JN0-322 Actual Questions


Juniper


JN0-322


Security Specialist (JNCIS-SEC)


https://killexams.com/pass4sure/exam-detail/JN0-322

image


Reference:


QUESTION 117

For IKE phase Question 1 negotiations, when is aggressive mode typically used?


  1. when one of the tunnel peers has a dynamic IP address

  2. when one of the tunnel peers wants to force main mode to be used

  3. when fragmentation of the IKE packet is required between the two peers

  4. when one of the tunnels peers wants to specify a different phase Question 1 proposal


Correct Answer: A


Reference: QUESTION 118

For a route-based VPN, which statement is true?


  1. host-inbound-traffic system services ike must be enabled on the st0.x interface

  2. host-inbound-traffic system services ike must be enabled on both the st0.x interface and the logical interface on which ike terminates

  3. host-inbound-traffic system services ike must be enabled on the logical interface on which ike terminates.

  4. host-inbound-traffic system services ike is not mandatory for route based VPNs.


Correct Answer: C


Reference: QUESTION 119

What are three benefits of using chassis clustering? (Choose three.)


  1. Provides stateful session failover for sessions

  2. Increases security capabilities for IPsec sessions.

  3. Provides active-passive control and data plane redundancy

  4. Enables automated fast-reroute capabilities

  5. Synchronizes configuration files and session state.


Correct Answer: ACE


Reference: QUESTION 120

You have been tasked with installing two SRX5600 platforms in a high- availability cluster. Which requirement must be met for a successful installation?

image

  1. You must enable SPC detect within the configuration

  2. You must enable active-active failover for redundancy

  3. You must ensure all SPCs use the same slot placement.

  4. You must configure auto-negotiation on the control ports of both devices


Correct Answer: C


Reference: QUESTION 121

Which three components can be downloaded and installed directly from Juniper Networks update server to an SRX Series device? (Choose three.)


  1. signature package

  2. PCRE package

  3. detector engine

  4. policy templates

  5. dynamic attack detection package


Correct Answer: ACD


Reference: QUESTION 122

Which two statements are true regarding firewall user authentication? (Choose two.)


  1. Firewall user authentication is performed only for traffic that is accepted by a security policy.

  2. Firewall user authentication is performed only for traffic that is denied by a security policy.

  3. Firewall user authentication provides an additional method of controlling user access to the Junos security device itself.

  4. Firewall user authentication provides an additional method of controlling user access to remote networks.


Correct Answer: AD


Reference: QUESTION 123

Which type of logging is supported for UTM logging to an external syslog server on branch SRX Series devices?


  1. Binary syslog

  2. CHARGEN

  3. WELF (structured) syslog

  4. standard (unstructured) syslog

image

Correct Answer: C


Reference: QUESTION 124

To which depth of compressed (Zip) files can the Junos full antivirus feature scan?


  1. 1 layer of compression

  2. 2 layer of compression

  3. 3 layer of compression

  4. 4 layer of compression


Correct Answer: D


Reference: QUESTION 125

Which two statements describe full file-based antivirus protection? (Choose two.)


  1. By default, the signature database is updated every 60 minutes.

  2. By default, the signature database is updated once daily.

  3. The signature database targets only critical viruses and malware.

  4. The signature database can detect polymorphic virus types.


Correct Answer: AD


Reference: QUESTION 126

If the policy server becomes unreachable, which two actions are available for connections that should be inspected by Web filtering when using integrated or redirect Web filtering? (Choose two.)


  1. Permit connections with logging.

  2. Drop connections

  3. Redirect connections to a different policy server

  4. Use the existing Web cache.


Correct Answer: AB


Reference:


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG