Pass the Juniper JNCIS-SEC JN0-335 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.

Download the IPS signature database.


B.

Enroll the SRX Series device with Juniper ATP Cloud.


C.

Install the IPS signature database.


D.

Reboot the SRX Series device.


Expert Solution
Questions # 22:

Click the Exhibit button.

Question # 22

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.

Add a security intelligence policy to the permit portion of the security policy.


B.

Add an action to the permit portion of the security policy.


C.

Add logging to the permit portion of the security policy.


D.

Add a match rule to the security policy with an appropriate threat level.


Expert Solution
Questions # 23:

You are asked to block malicious applications regardless of the port number being used.

In this scenario, which two application security features should be used? (Choose two.)

Options:

A.

AppFW


B.

AppQoE


C.

APPID


D.

AppTrack


Expert Solution
Questions # 24:

You are configuring logging for a security policy.

In this scenario, in which two situations would log entries be generated? (Choose two.)

Options:

A.

every 10 minutes


B.

at session initialization


C.

every 60 seconds


D.

at session close


Expert Solution
Questions # 25:

Which three statements about SRX Series device chassis clusters are true? (Choose three.)

Options:

A.

Chassis cluster control links must be configured using RFC 1918 IP addresses.


B.

Chassis cluster member devices synchronize configuration using the control link.


C.

A control link failure causes the secondary cluster node to be disabled.


D.

Recovery from a control link failure requires that the secondary member device be rebooted.


E.

Heartbeat messages verify that the chassis cluster control link is working.


Expert Solution
Questions # 26:

Which two statements are correct about AppTrack? (Choose two.)

Options:

A.

AppTrack can be configured for any defined logical system on an SRX Series device.


B.

AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.


C.

AppTrack collects traffic flow information including byte, packet, and duration statistics.


D.

AppTrack can only be configured in the main logical system on an SRX Series device.


Expert Solution
Questions # 27:

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.

Adaptive Threat Profiling


B.

Juniper Secure Analytics


C.

Juniper Identity Management Service


D.

Intrusion Prevention System


Expert Solution
Questions # 28:

Which two statements about SRX chassis clustering are correct? (Choose two.)

Options:

A.

SRX chassis clustering supports active/passive and active/active for the data plane.


B.

SRX chassis clustering only supports active/passive for the data plane.


C.

SRX chassis clustering supports active/passive for the control plane.


D.

SRX chassis clustering supports active/active for the control plane.


Expert Solution
Questions # 29:

You are asked to create an IPS-exempt rule base to eliminate false positives from happening.

Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)

Options:

A.

source port


B.

source IP address


C.

destination IP address


D.

destination port


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions