Pass the Juniper JNCIS-SEC JN0-335 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Exhibit

Question # 1

Referring to the SRX Series flow module diagram shown in the exhibit, where is application security processed?

Options:

A.

Forwarding Lookup


B.

Services ALGs


C.

Security Policy


D.

Screens


Expert Solution
Questions # 2:

Which two statements are true about the vSRX? (Choose two.)

Options:

A.

It does not have VMXNET3 vNIC support.


B.

It has VMXNET3 vNIC support.


C.

UNIX is the base OS.


D.

Linux is the base OS.


Expert Solution
Questions # 3:

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)

Options:

A.

The fab link does not support fragmentation.


B.

The physical interface for the fab link must be specified in the configuration.


C.

The fab link supports traditional interface features.


D.

The Junos OS supports only one fab link.


Expert Solution
Questions # 4:

Which two statements about unified security policies are correct? (Choose two.)

Options:

A.

Unified security policies require an advanced feature license.


B.

Unified security policies are evaluated after global security policies.


C.

Traffic can initially match multiple unified security policies.


D.

APPID results are used to determine the final security policy


Expert Solution
Questions # 5:

Which two statements are correct when considering IPS rule base evaluation? (Choose two.)

Options:

A.

IPS evaluates rules concurrently.


B.

IPS applies the most severe action to traffic matching multiple rules,


C.

IPS evaluates rules sequentially


D.

IPS applies the least severe action to traffic matching multiple rules.


Expert Solution
Questions # 6:

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

Options:

A.

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.


B.

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.


C.

JIMS domain PC probes are triggered to map usernames to group membership information.


D.

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.


Expert Solution
Questions # 7:

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

Options:

A.

building blocks


B.

assets


C.

events


D.

tests


Expert Solution
Questions # 8:

You are troubleshooting unexpected issues on your JIMS server due to out of order event log timestamps.

Which action should you take to solve this issue?

Options:

A.

Enable time synchronization on the client devices.


B.

Enable time synchronization on the JIMS server.


C.

Enable time synchronization on the domain controllers.


D.

Enable time synchronization on the SRX Series devices.


Expert Solution
Questions # 9:

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

Options:

A.

AppTrack


B.

AppQoS


C.

AppFW


D.

APPID


Expert Solution
Questions # 10:

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

Options:

A.

scalability


B.

no required software license


C.

granular security


D.

infinite number of interfaces


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions