Pass the Juniper Associate JNCIA-SEC JN0-231 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

Options:

A.

source NAT with PAT


B.

destination NAT


C.

NAT-T


D.

static NAT


Expert Solution
Questions # 2:

Which two components are configured for host inbound traffic? (Choose two.)

Options:

A.

zone


B.

logical interface


C.

physical interface


D.

routing instance


Expert Solution
Questions # 3:

What is the order in which malware is detected and analyzed?

Options:

A.

antivirus scanning –> cache lookup –> dynamic analysis –> static analysis


B.

cache lookup –> antivirus scanning –> static analysis –> dynamic analysis


C.

antivirus scanning –> cache lookup –> static analysis –> dynamic analysis


D.

cache lookup –> static analysis –> dynamic analysis –> antivirus scanning


Expert Solution
Questions # 4:

You are deploying an SRX Series firewall with multiple NAT scenarios.

In this situation, which NAT scenario takes priority?

Options:

A.

interface NAT


B.

source NAT


C.

static NAT


D.

destination NAT


Expert Solution
Questions # 5:

Which statement about service objects is correct?

Options:

A.

All applications are predefined by Junos.


B.

All applications are custom defined by the administrator.


C.

All applications are either custom or Junos defined.


D.

All applications in service objects are not available on the vSRX Series device.


Expert Solution
Questions # 6:

Click the Exhibit button.

Question # 6

Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)

Options:

A.

UDP traffic matched by the deny-all policy will be silently dropped.


B.

TCP traffic matched by the reject-all policy will have a TCP RST sent.


C.

TCP traffic matched from the zone trust is allowed by the permit-all policy.


D.

UDP traffic matched by the reject-all policy will be silently dropped.


Expert Solution
Questions # 7:

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)

Options:

A.

Associate the UTM policy with an address book.


B.

Associate the UTM policy with a firewall filter.


C.

Associate the UTM policy with a security policy.


D.

Associate the UTM feature profile with a UTM policy.


Expert Solution
Questions # 8:

What does the number “2” indicate in interface ge-0/1/2?

Options:

A.

the physical interface card (PIC)


B.

the flexible PIC concentrator (FPC)


C.

the interface logical number


D.

the port number


Expert Solution
Questions # 9:

What is the default timeout value for TCP sessions on an SRX Series device?

Options:

A.

30 seconds


B.

60 minutes


C.

60 seconds


D.

30 minutes


Expert Solution
Questions # 10:

Which Juniper ATP feed provides a dynamic list of known botnet servers and known sources of malware downloads?

Options:

A.

infected host cloud feed


B.

Geo IP feed


C.

C&C cloud feed


D.

blocklist feed


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions