JN0-322 Dumps
JN0-322 Braindumps JN0-322 Real Questions JN0-322 Practice Test
JN0-322 Actual Questions
Security Specialist (JNCIS-SEC)
https://killexams.com/pass4sure/exam-detail/JN0-322
Reference:
QUESTION 117
For IKE phase Question 1 negotiations, when is aggressive mode typically used?
when one of the tunnel peers has a dynamic IP address
when one of the tunnel peers wants to force main mode to be used
when fragmentation of the IKE packet is required between the two peers
when one of the tunnels peers wants to specify a different phase Question 1 proposal
Correct Answer: A
Reference: QUESTION 118
For a route-based VPN, which statement is true?
host-inbound-traffic system services ike must be enabled on the st0.x interface
host-inbound-traffic system services ike must be enabled on both the st0.x interface and the logical interface on which ike terminates
host-inbound-traffic system services ike must be enabled on the logical interface on which ike terminates.
host-inbound-traffic system services ike is not mandatory for route based VPNs.
Correct Answer: C
Reference: QUESTION 119
What are three benefits of using chassis clustering? (Choose three.)
Provides stateful session failover for sessions
Increases security capabilities for IPsec sessions.
Provides active-passive control and data plane redundancy
Enables automated fast-reroute capabilities
Synchronizes configuration files and session state.
Correct Answer: ACE
Reference: QUESTION 120
You have been tasked with installing two SRX5600 platforms in a high- availability cluster. Which requirement must be met for a successful installation?
You must enable SPC detect within the configuration
You must enable active-active failover for redundancy
You must ensure all SPCs use the same slot placement.
You must configure auto-negotiation on the control ports of both devices
Correct Answer: C
Reference: QUESTION 121
Which three components can be downloaded and installed directly from Juniper Networks update server to an SRX Series device? (Choose three.)
signature package
PCRE package
detector engine
policy templates
dynamic attack detection package
Correct Answer: ACD
Reference: QUESTION 122
Which two statements are true regarding firewall user authentication? (Choose two.)
Firewall user authentication is performed only for traffic that is accepted by a security policy.
Firewall user authentication is performed only for traffic that is denied by a security policy.
Firewall user authentication provides an additional method of controlling user access to the Junos security device itself.
Firewall user authentication provides an additional method of controlling user access to remote networks.
Correct Answer: AD
Reference: QUESTION 123
Which type of logging is supported for UTM logging to an external syslog server on branch SRX Series devices?
Binary syslog
CHARGEN
WELF (structured) syslog
standard (unstructured) syslog
Correct Answer: C
Reference: QUESTION 124
To which depth of compressed (Zip) files can the Junos full antivirus feature scan?
1 layer of compression
2 layer of compression
3 layer of compression
4 layer of compression
Correct Answer: D
Reference: QUESTION 125
Which two statements describe full file-based antivirus protection? (Choose two.)
By default, the signature database is updated every 60 minutes.
By default, the signature database is updated once daily.
The signature database targets only critical viruses and malware.
The signature database can detect polymorphic virus types.
Correct Answer: AD
Reference: QUESTION 126
If the policy server becomes unreachable, which two actions are available for connections that should be inspected by Web filtering when using integrated or redirect Web filtering? (Choose two.)
Permit connections with logging.
Drop connections
Redirect connections to a different policy server
Use the existing Web cache.
Correct Answer: AB
Reference:
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG