Pass the Juniper Associate JNCIA-SEC JN0-232 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements about the host-inbound-traffic parameter in a zone configuration are correct? (Choose two.)

Options:

A.

Deleting the host-inbound-traffic parameter blocks console access to the firewall.


B.

Deleting the host-inbound-traffic parameter blocks SSH access to the firewall.


C.

The host-inbound-traffic parameter is implicitly configured in the management zone.


D.

The host-inbound-traffic parameter is explicitly configured in a security zone.


Expert Solution
Questions # 2:

You are troubleshooting traffic traversing the SRX Series Firewall and require detailed information showing how the flow module is handling the traffic.

How would you accomplish this task?

Options:

A.

Review the flow session table.


B.

Review the forwarding table.


C.

Enable flow trace options.


D.

Enable firewall filters.


Expert Solution
Questions # 3:

Which security policy action will cause traffic to drop and a message to be sent to the source?

Options:

A.

permit


B.

next-policy


C.

deny


D.

reject


Expert Solution
Questions # 4:

You want to enable NextGen Web Filtering in SRX Series devices.

In this scenario, which two actions will accomplish this task? (Choose two.)

Options:

A.

Generate a CA-signed certificate.


B.

Generate a self-signed certificate.


C.

Configure an SSL initiation profile.


D.

Configure an SSL proxy profile.


Expert Solution
Questions # 5:

What happens if no match is found in both zone-based and global security policies?

Options:

A.

The traffic is discarded by the default security policy.


B.

The traffic is redirected to a predefined safe zone.


C.

The traffic is logged for further analysis.


D.

The traffic is allowed by default.


Expert Solution
Questions # 6:

Which two statements about global security policies are correct? (Choose two.)

Options:

A.

The from-zone and to-zone contexts are not required for a global security policy.


B.

Global security policies require specific zone contexts.


C.

Global policies are processed before zone-based security policies.


D.

You can use both zone-based security policies and global security policies at the same time.


Expert Solution
Questions # 7:

You have created a series of security policies permitting access to a variety of services. You now want to create a policy that blocks access to all other services for all user groups.

What should you create in this scenario?

Options:

A.

global security policy


B.

Juniper ATP policy


C.

IDP policy


D.

integrated user firewall policy


Expert Solution
Questions # 8:

Which two statements are correct about unified security policies? (Choose two.)

Options:

A.

Traffic that matches a unified policy will not be evaluated by traditional security policy.


B.

Dynamic applications in unified security policies analyze traffic based on Layer 4 information.


C.

Traffic that matches a traditional policy will not be evaluated by unified security policy.


D.

Dynamic applications in unified security policies analyze traffic based on Layer 7 information.


Expert Solution
Questions # 9:

You are troubleshooting first path traffic not passing through an SRX Series Firewall. You have determined that the traffic is ingressing and egressing the correct interfaces using a route lookup.

In this scenario, what is the next step in troubleshooting why the device may be dropping the traffic?

Options:

A.

Verify that the interfaces are in the correct security zones.


B.

Verify the routing protocol being used.


C.

Verify that source NAT is occurring.


D.

Verify that the correct ALG is being used.


Expert Solution
Questions # 10:

Click the Exhibit button.

Question # 10

Referring to the exhibit, which two statements are correct about the traffic flow shown in the exhibit? (Choose two.)

Options:

A.

There is no change to the original source IP address.


B.

The original source IP address was translated to a new source IP address.


C.

There is no change to the original destination IP address.


D.

The original destination IP address was translated to a new destination IP address.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions