Pass the Juniper JNCIS-SEC JN0-335 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Exhibit

Question # 11

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Nancy logged in to the juniper.net Active Directory domain.


B.

The IP address of Nancy's client PC is 172.25.11.


C.

The IP address of the authenticating domain controller is 172.25.11.140.


D.

Nancy is a member of the Active Directory sales group.


Expert Solution
Questions # 12:

You need to deploy an SRX Series device in your virtual environment.

In this scenario, what are two benefits of using a CSRX? (Choose two.)

Options:

A.

The cSRX supports Layer 2 and Layer 3 deployments.


B.

The cSRX default configuration contains three default zones: trust, untrust, and management.


C.

The cSRX supports firewall, NAT, IPS, and UTM services.


D.

The cSRX has low memory requirements.


Expert Solution
Questions # 13:

What are three capabilities of AppQoS? (Choose three.)

Options:

A.

re-write DSCP values


B.

assign a forwarding class


C.

re-write the TTL


D.

rate-limit traffic


E.

reserve bandwidth


Expert Solution
Questions # 14:

Your network uses a single JSA host and you want to implement a cluster.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

The software versions on both primary and secondary hosts


B.

The secondary host can backup multiple JSA primary hosts.


C.

The primary and secondary hosts must be configured with the same storage devices.


D.

The cluster virtual IP will need an unused IP address assigned.


Expert Solution
Questions # 15:

A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.

Which feed will the clients IP address be automatically added to in this situation?

Options:

A.

the command-and-control cloud feed


B.

the allowlist and blocklist feed


C.

the custom cloud feed


D.

the infected host cloud feed


Expert Solution
Questions # 16:

You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.

In this scenario, what is the correct order for rebooting the devices?

Options:

A.

Reboot the secondary device, then the primary device.


B.

Reboot only the secondary device since the primary will assign itself the correct cluster and node ID.


C.

Reboot the primary device, then the secondary device.


D.

Reboot only the primary device since the secondary will assign itself the correct cluster and node ID.


Expert Solution
Questions # 17:

On which three Hypervisors is vSRX supported? (Choose three.)

Options:

A.

VMware ESXi


B.

Citrix Hypervisor


C.

Hyper-V


D.

KVM


E.

Oracle VM


Expert Solution
Questions # 18:

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

Options:

A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.


B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.


C.

The fab interface enables configuration synchronization.


D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.


Expert Solution
Questions # 19:

Click the Exhibit button.

Question # 19

Referring to the exhibit, what will the SRX Series device do in this configuration?

Options:

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.


B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.


C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.


D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.


Expert Solution
Questions # 20:

Exhibit

Question # 20

Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)

Options:

A.

forward proxy


B.

client protection proxy


C.

server protection proxy


D.

reverse proxy


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions