Pass the Juniper JNCIP-SEC JN0-636 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

Options:

A.

Mismatched proxy ID


B.

Mismatched peer ID


C.

Mismatched preshared key


D.

Incorrect peer address.


Expert Solution
Questions # 22:

You are asked to look at a configuration that is designed to take all traffic with a specific source ip address and forward the

traffic to a traffic analysis server for further evaluation. The configuration is no longer working as intended.

Referring to the exhibit which change must be made to correct the configuration?

Options:

A.

Apply the filter as in input filter on interface xe-0/2/1.0


B.

Apply the filter as in input filter on interface xe-0/0/1.0


C.

Create a routing instance named default


D.

Apply the filter as in output filter on interface xe-0/1/0.0


Expert Solution
Questions # 23:

Exhibit

Question # 23

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

Options:

A.

Configure the tenant as TSYS1 for the pi security profile.


B.

Configure the tenant as root for the pi security profile.


C.

Configure the tenant as master for the pi security profile.


D.

Configure the tenant as local for the pi security profile


Expert Solution
Questions # 24:

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

Options:

A.

8080


B.

443


C.

80


D.

22


Expert Solution
Questions # 25:

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

Options:

A.

1


B.

3


C.

4


D.

2


Expert Solution
Questions # 26:

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

Options:

A.

Network


B.

Signature


C.

Protocol anomaly


D.

host


Expert Solution
Questions # 27:

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

Options:

A.

Enable JTAC remote access


B.

Create a temporary root account.


C.

Enable a JATP support account.


D.

Create a temporary admin account.


E.

Enable remote support.


Expert Solution
Questions # 28:

Exhibit

Question # 28

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This is the last packet in the session.


B.

The SRX Series device is performing both source and destination NAT on this session.


C.

This is the first packet in the session.


D.

The SRX Series device is performing only source NAT on this session.


Expert Solution
Questions # 29:

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access


B.

Enable Juniper ATP Cloud to share threat intelligence


C.

Configure application tokens in the Juniper ATP Cloud to limit who has access


D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.


Expert Solution
Questions # 30:

You want to enforce I DP policies on HTTP traffic.

In this scenario, which two actions must be performed on your SRX Series device? (Choose two )

Options:

A.

Choose an attacks type in the predefined-attacks-group HTTP-All.


B.

Disable screen options on the Untrust zone.


C.

Specify an action of None.


D.

Match on application junos-http.


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions