New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Juniper JN0-231 Security-Associate (JNCIA-SEC) Exam Practice Test

Demo: 31 questions
Total 105 questions

Security-Associate (JNCIA-SEC) Questions and Answers

Question 1

Click the Exhibit button.

What is the purpose of the host-inbound-traffic configuration shown in the exhibit?

Options:

A.

to permit host inbound HTTP traffic and deny all other traffic on the internal security zone

B.

to deny and log all host inbound traffic on the internal security zone, except for HTTP traffic

C.

to permit all host inbound traffic on the internal security zone, but deny HTTP traffic

D.

to permit host inbound HTTP traffic on the internal security zone

Question 2

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the

Internet. You do not want the webservers to initiate connections with external update servers on the Internet using the same IP address as customers use to access them.

Which two NAT types must be used to complete this project? (Choose two.)

Options:

A.

static NAT

B.

hairpin NAT

C.

destination NAT

D.

source NAT

Question 3

Click the Exhibit button.

Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)

Options:

A.

The DMZ routing-instance is the source.

B.

The 10.10.102.10 IP address is the source.

C.

The 10.10.102.10 IP address is the destination.

D.

The DMZ routing-instance is the destination.

Question 4

Which IPsec protocol is used to encrypt the data payload?

Options:

A.

ESP

B.

IKE

C.

AH

D.

TCP

Question 5

When are Unified Threat Management services performed in a packet flow?

Options:

A.

before security policies are evaluated

B.

as the packet enters an SRX Series device

C.

only during the first path process

D.

after network address translation

Question 6

Which two statements are correct about IKE security associations? (Choose two.)

Options:

A.

IKE security associations are established during IKE Phase 1 negotiations.

B.

IKE security associations are unidirectional.

C.

IKE security associations are established during IKE Phase 2 negotiations.

D.

IKE security associations are bidirectional.

Question 7

Which two statements are correct about the null zone on an SRX Series device? (Choose two.)

Options:

A.

The null zone is created by default.

B.

The null zone is a functional security zone.

C.

Traffic sent or received by an interface in the null zone is discarded.

D.

You must enable the null zone before you can place interfaces into it.

Question 8

Which statement is correct about Junos security policies?

Options:

A.

Security policies enforce rules that should be applied to traffic transiting an SRX Series device.

B.

Security policies determine which users are allowed to access an SRX Series device.

C.

Security policies control the flow of internal traffic within an SRX Series device.

D.

Security policies identity groups of users that have access to different features on an SRX Series device.

Question 9

Which two services does Juniper Connected Security provide? (Choose two.)

Options:

A.

protection against zero-day threats

B.

IPsec VPNs

C.

Layer 2 VPN tunnels

D.

inline malware blocking

Question 10

Which statement is correct about static NAT?

Options:

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Question 11

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

Options:

A.

IDP signature feed

B.

C&C cloud feed

C.

infected host cloud feed

D.

US CERT threat feed

Question 12

What is the main purpose of using screens on an SRX Series device?

Options:

A.

to provide multiple ports for accessing security zones

B.

to provide an alternative interface into the CLI

C.

to provide protection against common DoS attacks

D.

to provide information about traffic patterns traversing the network

Question 13

You want to block executable files ("exe) from being downloaded onto your network.

Which UTM feature would you use in this scenario?

Options:

A.

IPS

B.

Web filtering

C.

content filtering

D.

antivirus

Question 14

What are two logical properties of an interface? (Choose two.)

Options:

A.

link mode

B.

IP address

C.

VLAN ID

D.

link speed

Question 15

Which two statements are correct about IPsec security associations? (Choose two.)

Options:

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Question 16

What are two valid address books? (Choose two.)

Options:

A.

66.129.239.128/25

B.

66.129.239.154/24

C.

66.129.239.0/24

D.

66.129.239.50/25

Question 17

What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?

Options:

A.

3

B.

4

C.

2

D.

5

Question 18

When configuring antispam, where do you apply any local lists that are configured?

Options:

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Question 19

When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)

Options:

A.

MPLS

B.

UTM

C.

CoS

D.

IDP

Question 20

What must be enabled on an SRX Series device for the reporting engine to create reports?

Options:

A.

System logging

B.

SNMP

C.

Packet capture

D.

Security logging

Question 21

You want to deploy a NAT solution.

In this scenario, which solution would provide a static translation without PAT?

Options:

A.

interface-based source NAT

B.

pool-based NAT with address shifting

C.

pool-based NAT with PAT

D.

pool-based NAT without PAT

Question 22

The UTM features are performed during which process of the SRX Series device's packet flow?

Options:

A.

services

B.

security policies

C.

zones

D.

screens

Question 23

Which statement is correct about packet mode processing?

Options:

A.

Packet mode enables session-based processing of incoming packets.

B.

Packet mode works with NAT, VPNs, UTM, IDP, and other advanced security services.

C.

Packet mode bypasses the flow module.

D.

Packet mode is the basis for stateful processing.

Question 24

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

Options:

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Question 25

What are two features of the Juniper ATP Cloud service? (Choose two.)

Options:

A.

sandbox

B.

malware detection

C.

EX Series device integration

D.

honeypot

Question 26

You want to enable the minimum Juniper ATP services on a branch SRX Series device.

In this scenario, what are two requirements to accomplish this task? (Choose two.)

Options:

A.

Install a basic Juniper ATP license on the branch device.

B.

Configure the juniper-atp user account on the branch device.

C.

Register for a Juniper ATP account on https://sky.junipersecurity.net.

D.

Execute the Juniper ATP script on the branch device.

Question 27

A security zone is configured with the source IP address 192.168.0.12/255.255.0.255 wildcard match.

In this scenario, which two IP packets will match the criteria? (Choose two.)

Options:

A.

192.168.1.21

B.

192.168.0.1

C.

192.168.1.12

D.

192.168.22.12

Question 28

What is the default value of the dead peer detection (DPD) interval for an IPsec VPN tunnel?

Options:

A.

20 seconds

B.

5 seconds

C.

10 seconds

D.

40 seconds

Question 29

Which two components are configured for host inbound traffic? (Choose two.)

Options:

A.

zone

B.

logical interface

C.

physical interface

D.

routing instance

Question 30

Which two statements are correct about the default behavior on SRX Series devices? (Choose two.)

Options:

A.

The SRX Series device is in flow mode.

B.

The SRX Series device supports stateless firewalls filters.

C.

The SRX Series device is in packet mode.

D.

The SRX Series device does not support stateless firewall filters.

Question 31

What are three primary match criteria used in a Junos security policy? (Choose three.)

Options:

A.

application

B.

source address

C.

source port

D.

class

E.

destination address

Demo: 31 questions
Total 105 questions