Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Juniper JN0-232 Dumps

Page: 1 / 7
Total 65 questions

Security, Associate (JNCIA-SEC) Questions and Answers

Question 1

What is the purpose of a feature profile in a UTM configuration?

Options:

A.

It applies a UTM feature to a security policy.

B.

It applies a UTM feature to protocol traffic.

C.

It defines the operation of a specific UTM feature.

D.

It defines an object list.

Question 2

Which security policy action will cause traffic to drop and a message to be sent to the source?

Options:

A.

permit

B.

next-policy

C.

deny

D.

reject

Question 3

When does screening occur in the flow module?

Options:

A.

before session lookup

B.

during policy lookup

C.

during route lookup

D.

after session lookup

Question 4

Which two statements are true about the NextGen Web Filtering (NGWF) feature on an SRX Series device? (Choose two.)

Options:

A.

The NGWF feature consults the Juniper cloud before consulting your local lists.

B.

The NGWF feature requires a license.

C.

The NGWF feature consults your local lists before consulting the Juniper cloud.

D.

The NGWF feature does not require a license.

Question 5

Which two statements are correct about security zones on an SRX Series device? (Choose two.)

Options:

A.

Security zones can be shared between routing instances.

B.

Security zones cannot be shared between routing instances.

C.

Intrazone and interzone traffic both require security policies.

D.

Multiple security zones cannot be configured on an SRX Series device.

Question 6

You are troubleshooting traffic traversing the SRX Series Firewall and require detailed information showing how the flow module is handling the traffic.

How would you accomplish this task?

Options:

A.

Review the flow session table.

B.

Review the forwarding table.

C.

Enable flow trace options.

D.

Enable firewall filters.

Question 7

Which two statements about the host-inbound-traffic parameter in a zone configuration are correct? (Choose two.)

Options:

A.

Deleting the host-inbound-traffic parameter blocks console access to the firewall.

B.

Deleting the host-inbound-traffic parameter blocks SSH access to the firewall.

C.

The host-inbound-traffic parameter is implicitly configured in the management zone.

D.

The host-inbound-traffic parameter is explicitly configured in a security zone.

Question 8

Which statement is correct about exception traffic?

Options:

A.

Exception traffic is only handled on the Packet Forwarding Engine.

B.

Exception traffic is rate-limited on the connection between the Packet Forwarding Engine and the Routing Engine.

C.

Exception traffic is anything that is rejected by security policies and requires additional processing.

D.

Exception traffic refers to malformed IP packets received on the Packet Forwarding Engine.

Question 9

Click the Exhibit button.

as

Referring to the exhibit, which two statements are correct about the traffic flow shown in the exhibit? (Choose two.)

Options:

A.

There is no change to the original source IP address.

B.

The original source IP address was translated to a new source IP address.

C.

There is no change to the original destination IP address.

D.

The original destination IP address was translated to a new destination IP address.

Question 10

Which statement is correct about source NAT?

Options:

A.

It translates MAC addresses to private IP addresses.

B.

It translates private IP addresses to public IP addresses.

C.

It performs bidirectional IP address translation.

D.

It performs translation on ingress traffic only.

Question 11

Click the Exhibit button.

as

The exhibit shows a table representing security policies from the trust zone to the untrust zone.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

SSH requests from the source IP address of 172.25.11.10 are permitted to the destination IP address of 10.1.0.10.

B.

Ping command requests from the source IP address of 172.25.11.100 are denied to the destination IP address of 10.1.0.10.

C.

FTP requests from the source IP address of 10.1.0.10 are permitted to the destination IP address of 172.25.11.100.

D.

FTP requests from the source IP address of 172.25.11.11 are denied to the destination IP address of 10.1.0.10.

Question 12

In which order does Junos OS process the various forms of NAT?

Options:

A.

static NAT, destination NAT, source NAT

B.

destination NAT, source NAT, static NAT

C.

source NAT, static NAT, destination NAT

D.

source NAT, destination NAT, static NAT

Question 13

A new packet arrives on an interface on your SRX Series Firewall that is assigned to the trust security zone.

In this scenario, how does the SRX Series Firewall determine the egress security zone?

Options:

A.

by performing a session lookup

B.

by examining the destination port

C.

by performing a route lookup

D.

by examining the ingress security zone properties

Question 14

You have created a series of security policies permitting access to a variety of services. You now want to create a policy that blocks access to all other services for all user groups.

What should you create in this scenario?

Options:

A.

global security policy

B.

Juniper ATP policy

C.

IDP policy

D.

integrated user firewall policy

Question 15

You are modifying the NAT rule order and you notice that a new NAT rule has been added to the bottom of the list.

In this situation, which command would you use to reorder NAT rules?

Options:

A.

top

B.

run

C.

up

D.

insert

Question 16

Content filtering supports which two of the following protocols? (Choose two.)

Options:

A.

SMTP

B.

SNMP

C.

TFTP

D.

HTTP

Question 17

Which two statements are correct about unified security policies on SRX Series Firewalls? (Choose two.)

Options:

A.

Unified security policies match applications before processing policy statements.

B.

Unified security policies can be zone-based or global.

C.

Unified security policies use the application identification (AppID) engine.

D.

Unified security policies with multiple matches use the most restrictive match.

Question 18

Which two statements about the null zone on an SRX Series Firewall are correct? (Choose two.)

Options:

A.

Transit interfaces are assigned to the null zone by default.

B.

Traffic rejected by the security policy is sent to the null zone for logging.

C.

The null zone can be configured to accept traffic to or from the SRX Series Firewall.

D.

A logical interface configured in a security zone removes it from the null zone.

Question 19

Click the Exhibit button.

as

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This security policy uses a non-default inactivity timeout.

B.

This security policy is the second security policy in the list.

C.

This security policy permits HTTPS traffic.

D.

This security policy is a zone-based security policy.

Page: 1 / 7
Total 65 questions