Juniper Pre - JN0-231 65q-DEMO
Juniper Pre - JN0-231 65q-DEMO
Juniper Pre - JN0-231 65q-DEMO
Which two criteria should a zone-based security policy include? (Choose two.)
A. a source port
B. a destination port
C. zone context
D. an action
Answer: B, D
Explanation:
Question No: 2
You are assigned a project to configure SRX Series devices to allow connections to your webservers.
The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. You do not want the webservers to initiate connections with external update servers on the Internet using the same IP
address as customers use to access them.
Which two NAT types must be used to complete this project? (Choose two.)
A. static NAT
B. hairpin NAT
C. destination NAT
D. source NAT
Answer: C, D
Explanation:
Question No: 3
You are asked to verify that a license for AppSecure is installed on an SRX Series device.
In this scenario, which command will provide you with the required information?
Answer: A
Explanation:
Question No: 4
B. [edit] user@vSRX-1#
D. user@vSRX-1>
Answer: B
Explanation:
Question No: 5
You want to enable the minimum Juniper ATP services on a branch SRX Series device.
In this scenario, what are two requirements to accomplish this task? (Choose two.)
Answer: A, C
Explanation:
Question No: 6
A. 40
B. 60
C. 50
D. 10
Answer: C
Explanation:
Question No: 7
Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)
A. FTP
B. SMTP
D. HTTP
E. SSH
Answer: A, C, D
Explanation:
Question No: 8
Answer: D
Explanation:
Question No: 9
When configuring antispam, where do you apply any local lists that are configured?
A. custom objects
C. antispam feature-profile
Answer: B
Explanation:
Question No: 10
Screens on an SRX Series device protect against which two types of threats? (Choose two.)
A. IP spoofing
B. ICMP flooding
C. zero-day outbreaks
Answer: A, B
Explanation:
Question No: 11
B. The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.
C. The same IP address from a destination NAT pool will be assigned for all sessions for a given host.
D. The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.
Answer: A
Explanation:
Question No: 12
You are asked to configure your SRX Series device to block all traffic from certain countries. The solution must be automatically updated as IP prefixes become allocated to those certain countries.
A. Geo IP
C. IDP
D. C&C feed
Answer: A
Explanation:
Question No: 13
Which two statements are correct about IKE security associations? (Choose two.)
Answer: A, D
Explanation:
Question No: 14
In this scenario, which solution would provide a static translation without PAT?
Answer: D
Question No: 15
Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?
A. firewall filters
B. UTM
D. IPS
Answer: C
Explanation:
Question No: 16
You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.
B. destination NAT
C. NAT-T
D. static NAT
Answer: D
Explanation:
Question No: 17
You want to provide remote access to an internal development environment for 10 remote developers.
Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)
Answer: A, B
Explanation:
Question No: 18
You are deploying an SRX Series firewall with multiple NAT scenarios.
A. interface NAT
C. static NAT
D. destination NAT
Answer: C
Explanation:
Question No: 19
Your ISP gives you an IP address of 203.0.113.0/27 and informs you that your default gateway is 203.0.113.1. You configure destination NAT to your internal server, but the requests sent to the webserver at 203.0.113.5 are not arriving
at the server.
In this scenario, which two configuration features need to be added? (Choose two.)
A. firewall filter
B. security policy
C. proxy-ARP
D. UTM policy
Answer: B, C
Explanation:
Question No: 20
Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)
Answer: A, C
Explanation:
A. ESP
B. IKE
C. AH
D. TCP
Answer: A
Explanation:
Question No: 22
What are three primary match criteria used in a Junos security policy? (Choose three.)
A. application
B. source address
C. source port
D. class
E. destination address
Answer: A, B, E
Explanation:
Question No: 23
You have an FTP server and a webserver on the inside of your network that you want to make available to users outside of the network. You are allocated a single public IP address.
In this scenario, which two NAT elements should you configure? (Choose two.)
A. destination NAT
B. NAT pool
C. source NAT
D. static NAT
Answer: A, D
Explanation:
Question No: 24
Which three Web filtering deployment actions are supported by Junos? (Choose three.)
A. Use IPS.
Answer: B, D, E
Explanation:
Question No: 25
Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)
A. SHA-1
B. SHAKE128
C. MD5
D. RIPEMD-256
Answer: A, C
Explanation:
Question No: 26
A. to permit host inbound HTTP traffic and deny all other traffic on the internal security zone
B. to deny and log all host inbound traffic on the internal security zone, except for HTTP traffic
C. to permit all host inbound traffic on the internal security zone, but deny HTTP traffic
Answer: C
Question No: 27
When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)
A. MPLS
B. UTM
C. CoS
D. IDP
Answer: A, C
Explanation:
Question No: 28
Which two statements are correct about the default behavior on SRX Series devices? (Choose two.)
D. The SRX Series device does not support stateless firewall filters.
Answer: A, B
Explanation:
Question No: 29
Which two statements are correct about functional zones? (Choose two.)
Answer: B, D
Explanation:
Question No: 30
What must be enabled on an SRX Series device for the reporting engine to create reports?
A. packet capture
B. security logging
C. system logging
D. SNMP
Explanation:
Question No: 31
You are assigned a project to configure SRX Series devices to allow connections to your webservers.
The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.
A. source NAT
B. destination NAT
C. static NAT
D. hairpin NAT
Answer: B
Explanation:
Question No: 32
Which two user authentication methods are supported when using a Juniper Secure Connect VPN?
(Choose two.)
A. certificate-based
B. multi-factor authentication
C. local authentication
D. active directory
Answer: A, C
Explanation:
Question No: 33
B. TCP traffic matched by the reject-all policy will have a TCP RST sent.
C. TCP traffic matched from the zone trust is allowed by the permit-all policy.
Answer: A, B
Explanation:
Question No: 34
You are monitoring an SRX Series device that has the factory-default configuration applied.
Answer: C
Question No: 35
When transit traffic matches a security policy, which three actions are available? (Choose three.)
A. Allow
B. Discard
C. Deny
D. Reject
E. Permit
Answer: C, D, E
Explanation:
Question No: 36
Which two services does Juniper Connected Security provide? (Choose two.)
B. IPsec VPNs
Answer: A, D
Explanation:
Question No: 37
In this scenario, which two statements are correct about proxy IDs? (Choose two.)
Answer: A, B
Explanation:
Question No: 38
Which two components are configured for host inbound traffic? (Choose two.)
A. zone
B. logical interface
D. routing instance
Answer: A, B
Explanation:
Question No: 39
A. IPS/IDP
B. security zones
C. application firewall
Answer: A, C
Explanation:
Question No: 40
Which two UTM features should be used for tracking productivity and corporate user behavior?
(Choose two.)
Answer: A, C
Explanation:
Question No: 41
A. antivirus scanning –> cache lookup –> dynamic analysis –> static analysis
B. cache lookup –> antivirus scanning –> static analysis –> dynamic analysis
C. antivirus scanning –> cache lookup –> static analysis –> dynamic analysis
D. cache lookup –> static analysis –> dynamic analysis –> antivirus scanning
Answer: B
Explanation:
Question No: 42
B. 66.129.239.154/24
C. 66.129.239.0/24
D. 66.129.239.50/25
Answer: B, D
Explanation:
Question No: 43
What is the order of the first path packet processing when a packet enters a device?
Answer: C
Explanation:
Question No: 44
A. inet.0
B. fxp0
C. address book
D. ge-0/0/0.0
Answer: B, D
Explanation:
Question No: 45
B. Packet mode works with NAT, VPNs, UTM, IDP, and other advanced security services.
Answer: C
Explanation:
Question No: 46
A. SSH sessions
C. HTTP sessions
D. traceroute packets
Answer: B, D
Explanation:
Question No: 47
A. system slot number –> interface media type –> port number –> line card slot number
B. system slot number –> port number –> interface media type –> line card slot number
C. interface media type –> system slot number –> line card slot number –> port number
D. interface media type –> port number –> system slot number –> line card slot number
Answer: C
Explanation:
Question No: 48
D. When an interface is deleted from a zone, it is assigned back to the null zone.
Answer: B, D
Explanation:
Question No: 49
Answer: A, D
Explanation:
Answer: D
Explanation:
Question No: 51
Which statement is correct about global security policies on SRX Series devices?
Answer: D
Explanation:
Question No: 52
B. resource utilization
C. system version
D. routing tables
Answer: B
Explanation:
Question No: 53
Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.
In this scenario, which security feature would you use to satisfy this request?
A. antivirus
B. Web filtering
C. content filtering
D. antispam
Explanation:
Question No: 54
Which statement is correct about unified security policies on an SRX Series device?
Answer: A
Explanation:
Question No: 55
You are asked to allow only ping and SSH access to the security policies shown in the exhibit.
Answer: B
Explanation:
Question No: 56
What are two features of the Juniper ATP Cloud service? (Choose two.)
A. sandbox
B. malware detection
D. honeypot
Answer: A, B
Explanation:
Question No: 57
You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file.
A. configure master
B. cli privileged
C. configure exclusive
D. configure
Answer: C
Explanation:
Question No: 58
Which order is correct for Junos security devices that examine policies for transit traffic?
A. zone policies
global policies
default policies
B. default policies
zone policies
global policies
C. default policies
global policies
zone policies
D. global policies
Explanation:
Question No: 59
Answer: D
Explanation:
Question No: 60
Answer: D
Explanation:
Question No: 61
Which Juniper ATP feed provides a dynamic list of known botnet servers and known sources of malware downloads?
B. Geo IP feed
D. blocklist feed
Answer: A
Explanation:
Question No: 62
Which two IKE Phase 1 configuration options must match on both peers to successfully establish a tunnel? (Choose two.)
A. VPN name
C. IKE mode
D. Diffie-Hellman group
Answer: C, D
Explanation:
Question No: 63
A. screens
B. antivirus
C. Web filtering
D. IDP/IPS
E. content filtering
Answer: B, C, E
Explanation:
Question No: 64
You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.
Answer: C, D
Explanation:
Question No: 65
A security zone is configured with the source IP address 192.168.0.12/255.255.0.255 wildcard match.
In this scenario, which two IP packets will match the criteria? (Choose two.)
A. 192.168.1.21
B. 192.168.0.1
C. 192.168.1.12
D. 192.168.22.12
Answer: C, D