Latest JN0-322 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : JN0-322
Exam Name : Security Specialist (JNCIS-SEC)
Vendor Name : "Juniper"







JN0-322 Dumps

JN0-322 Braindumps JN0-322 Real Questions JN0-322 Practice Test

JN0-322 Actual Questions


Juniper


JN0-322


Security Specialist (JNCIS-SEC)


https://killexams.com/pass4sure/exam-detail/JN0-322


Reference:


QUESTION 117

For IKE phase Question 1 negotiations, when is aggressive mode typically used?


  1. when one of the tunnel peers has a dynamic IP address

  2. when one of the tunnel peers wants to force main mode to be used

  3. when fragmentation of the IKE packet is required between the two peers

  4. when one of the tunnels peers wants to specify a different phase Question 1 proposal


Correct

Answer: A


Reference: QUESTION 118

For a route-based VPN, which statement is true?


  1. host-inbound-traffic system services ike must be enabled on the st0.x interface

  2. host-inbound-traffic system services ike must be enabled on both the st0.x interface and the logical interface on which ike terminates

  3. host-inbound-traffic system services ike must be enabled on the logical interface on which ike terminates.

  4. host-inbound-traffic system services ike is not mandatory for route based VPNs.


Correct

Answer: C


Reference: QUESTION 119

What are three benefits of using chassis clustering? (Choose three.)


  1. Provides stateful session failover for sessions

  2. Increases security capabilities for IPsec sessions.

  3. Provides active-passive control and data plane redundancy

  4. Enables automated fast-reroute capabilities

  5. Synchronizes configuration files and session state.


Correct

Answer: ACE


Reference: QUESTION 120

You have been tasked with installing two SRX5600 platforms in a high- availability cluster. Which requirement must be met for a successful installation?

  1. You must enable SPC detect within the configuration

  2. You must enable active-active failover for redundancy

  3. You must ensure all SPCs use the same slot placement.

  4. You must configure auto-negotiation on the control ports of both devices


Correct

Answer: C


Reference: QUESTION 121

Which three components can be downloaded and installed directly from Juniper Networks update server to an SRX Series device? (Choose three.)


  1. signature package

  2. PCRE package

  3. detector engine

  4. policy templates

  5. dynamic attack detection package


Correct

Answer: ACD


Reference: QUESTION 122

Which two statements are true regarding firewall user authentication? (Choose two.)


  1. Firewall user authentication is performed only for traffic that is accepted by a security policy.

  2. Firewall user authentication is performed only for traffic that is denied by a security policy.

  3. Firewall user authentication provides an additional method of controlling user access to the Junos security device itself.

  4. Firewall user authentication provides an additional method of controlling user access to remote networks.


Correct

Answer: AD


Reference: QUESTION 123

Which type of logging is supported for UTM logging to an external syslog server on branch SRX Series devices?


  1. Binary syslog

  2. CHARGEN

  3. WELF (structured) syslog

  4. standard (unstructured) syslog

Correct

Answer: C


Reference: QUESTION 124

To which depth of compressed (Zip) files can the Junos full antivirus feature scan?


  1. 1 layer of compression

  2. 2 layer of compression

  3. 3 layer of compression

  4. 4 layer of compression


Correct

Answer: D


Reference: QUESTION 125

Which two statements describe full file-based antivirus protection? (Choose two.)


  1. By default, the signature database is updated every 60 minutes.

  2. By default, the signature database is updated once daily.

  3. The signature database targets only critical viruses and malware.

  4. The signature database can detect polymorphic virus types.


Correct

Answer: AD


Reference: QUESTION 126

If the policy server becomes unreachable, which two actions are available for connections that should be inspected by Web filtering when using integrated or redirect Web filtering? (Choose two.)


  1. Permit connections with logging.

  2. Drop connections

  3. Redirect connections to a different policy server

  4. Use the existing Web cache.


Correct

Answer: AB


Reference: