Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Juniper JN0-636 Dumps

Page: 1 / 12
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 1

Exhibit

as

Which two statements are correct about the output shown in the exhibit? (Choose two.)

Options:

A.

The packet is processed as host inbound traffic.

B.

The packet matches the default security policy.

C.

The packet matches a configured security policy.

D.

The packet is processed in the first path packet flow.

Question 2

You are asked to control access to network resources based on the identity of an authenticated device

Which three steps will accomplish this goal on the SRX Series firewalls? (Choose three )

Options:

A.

Configure an end-user-profile that characterizes a device or set of devices

B.

Reference the end-user-profile in the security zone

C.

Reference the end-user-profile in the security policy.

D.

Apply the end-user-profile at the interface connecting the devices

E.

Configure the authentication source to be used to authenticate the device

Question 3

Exhibit

as

You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated.

Referring to the exhibit, what is a reason for this behavior?

Options:

A.

The C&C events are false positives.

B.

The infected host score is globally set bellow a threat level of 5.

C.

The infected host score is globally set above a threat level of 5.

D.

The ETI events are false positives.

Question 4

you configured a security policy permitting traffic from the trust zone to the untrust zone but your

traffic not hitting the policy.

In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?

Options:

A.

show security policy-report

B.

show security application-tracking counters

C.

show security match-policies

D.

request security policies check

Question 5

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

Options:

A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Question 6

Which two modes are supported on Juniper ATP Cloud? (Choose two.)

Options:

A.

global mode

B.

transparent mode

C.

private mode

D.

Layer 3 mode

Question 7

Exhibit

as

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

Question 8

Which two log format types are supported by the JATP appliance? (Choose two.)

Options:

A.

YAML

B.

XML

C.

CSV

D.

YANG

Question 9

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

Options:

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Question 10

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

Options:

A.

The NAT resources must be defined in the security profile for the interconnect logical system.

B.

No resources are needed to be allocated to the interconnect logical system.

C.

The resources must be calculated based on the amount of traffic that will flow between the logical systems.

D.

The flow-session resource must be defined in the security profile for the interconnect logical system.

Question 11

What is the purpose of the Switch Microservice of Policy Enforcer?

Options:

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

Question 12

Exhibit:

as

Referring to the exhibit, the operator user is unable to save configuration files to a usb stick the is

plugged into SRX. What should you do to solve this problem?

Options:

A.

Add the floppy permission flag to the operations class

B.

Add the system-control permission flag to the operation class

C.

Add the interface-control permission flag to the operation class

D.

Add the system permission flag to the operation class

Question 13

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

Options:

A.

In the show security policies hit-count command output.

B.

In the show security flow statistics command output.

C.

In the show security policies detail command output.

D.

In the show firewall log command output.

Question 14

Exhibit

as

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

Options:

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Question 15

You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud

Which command will return this information?

Options:

A.

show security dynamic—address category—name CC | match 203.0.113.5

B.

show security dynamic—address category—name Infected—Hosts | match 203.0.113.5

C.

show security dynamic-address category-name IP Filter I match 203.0.113.5

D.

show Security dynamic-address category-name JWAS | match 203.0.113.5

Question 16

You are requested to enroll an SRX Series device with Juniper ATP Cloud.

Which statement is correct in this scenario?

Options:

A.

If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.

B.

The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.

C.

When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period

D.

Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.

Question 17

Exhibit

as

Referring to the exhibit, which three statements are true? (Choose three.)

Options:

A.

The packet's destination is to an interface on the SRX Series device.

B.

The packet's destination is to a server in the DMZ zone.

C.

The packet originated within the Trust zone.

D.

The packet is dropped before making an SSH connection.

E.

The packet is allowed to make an SSH connection.

Question 18

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

Options:

A.

WELF

B.

JSON

C.

CEF

D.

binay

Question 19

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

Options:

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Question 20

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 21

Exhibit

as

Referring to the exhibit, an internal host is sending traffic to an Internet host using the 203.0.113.1 reflexive address with source port 54311.

Which statement is correct in this situation?

Options:

A.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

B.

Only the Internet host that the internal host originally communicated with can initiate traffic to reach the internal host using the 203.0 113.1 address, a random source port, and destination port 54311.

C.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, source port 54311, and a random destination port.

D.

Any host on the Internet can initiate traffic to reach the internal host using the 203.0.113.1 address, a random source port, and destination port 54311.

Question 22

Click the Exhibit button.

as

When attempting to enroll an SRX Series device to JATP, you receive the error shown in the exhibit. What is the cause of the error?

Options:

A.

The fxp0 IP address is not routable

B.

The SRX Series device certificate does not match the JATP certificate

C.

The SRX Series device does not have an IP address assigned to the interface that accesses JATP

D.

A firewall is blocking HTTPS on fxp0

Question 23

Exhibit

as

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Question 24

Exhibit:

as

The security trace options configuration shown in the exhibit is committed to your SRX series firewall. Which two statements are correct in this Scenario? (Choose Two)

Options:

A.

The file debugger will be readable by all users.

B.

Once the trace has generated 10 log files, older logs will be overwritten.

C.

Once the trace has generated 10 log files, the trace process will halt.

D.

The file debugger will be readable only by the user who committed this configuration

Question 25

Exhibit

as

You are asked to establish an IBGP peering between the SRX Series device and the router, but the session is not being established. In the security flow trace on the SRX device, packet drops are observed as shown in the exhibit.

What is the correct action to solve the problem on the SRX device?

Options:

A.

Create a firewall filter to accept the BGP traffic

B.

Configure destination NAT for BGP traffic.

C.

Add BGP to the Allowed host-inbound-traffic for the interface

D.

Modify the security policy to allow the BGP traffic.

Question 26

you must find an infected host and where the a?ack came from using the Juniper ATP Cloud. Which two monitor workspaces will return the requested information? (Choose Two)

Options:

A.

Hosts

B.

File Scanning

C.

Threat Sources

D.

Encrypted Traffic

Question 27

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

Options:

A.

1

B.

3

C.

4

D.

2

Question 28

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

Options:

A.

VRF instances

B.

virtual router instances

C.

logical systems

D.

tenant systems

Question 29

Exhibit.

as

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The configured solution allows IPv6 to IPv4 translation.

B.

The configured solution allows IPv4 to IPv6 translation.

C.

The IPv6 address is invalid.

D.

External hosts cannot initiate contact.

Question 30

Exhibit

as

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Options:

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Question 31

Your organization has multiple Active Directory domain to control user access. You must ensure that security polices are passing traffic based upon the user’s access rights.

What would you use to assist your SRX series devices to accomplish this task?

Options:

A.

JIMS

B.

Junos Space

C.

JSA

D.

JATP Appliance

Question 32

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

Options:

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Question 33

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

Options:

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Question 34

Click the Exhibit button.

as

Which type of NAT is shown in the exhibit?

Options:

A.

NAT46

B.

NAT64

C.

persistent NAT

D.

DS-Lite

Page: 1 / 12
Total 115 questions