Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Juniper JN0-335 Security, Specialist (JNCIS-SEC) Exam Practice Test

Demo: 29 questions
Total 98 questions

Security, Specialist (JNCIS-SEC) Questions and Answers

Question 1

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

Options:

A.

In the vSwitch security settings, accept promiscuous mode.

B.

In the vSwitch properties settings, set the VLAN ID to None.

C.

In the vSwitch security settings, reject forged transmits.

D.

In the vSwitch security settings, reject MAC address changes.

Question 2

What are two types of system logs that Junos generates? (Choose two.)

Options:

A.

SQL log files

B.

data plane logs

C.

system core dump files

D.

control plane logs

Question 3

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Juniper ATP Cloud only uses one antivirus software package to analyze files.

B.

Juniper ATP Cloud uses multiple antivirus software packages to analyze files.

C.

Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.

D.

Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.

Question 4

Which two devices would you use for DDoS protection with Policy Enforcer? (Choose two.)

Options:

A.

vQFX

B.

MX

C.

vMX

D.

QFX

Question 5

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.

Adaptive Threat Profiling

B.

Juniper Secure Analytics

C.

Juniper Identity Management Service

D.

Intrusion Prevention System

Question 6

Which two statements are correct about Juniper ATP Cloud? (Choose two.)

Options:

A.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.

B.

Once the target threshold is met, Juniper ATP Cloud continues looking for threats levels range from 0 to 10 minutes.

C.

The threat levels range from 0-10.

D.

The threat levels range from 0-100.

Question 7

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

Options:

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Question 8

Click the Exhibit button.

Which two statements describe the output shown in the exhibit? (Choose two.)

Options:

A.

Redundancy group 1 experienced an operational failure.

B.

Redundancy group 1 was administratively failed over.

C.

Node 0 is controlling traffic for redundancy group 1.

D.

Node 1 is controlling traffic for redundancy group 1.

Question 9

Which two statements about SRX Series device chassis clusters are true? (Choose two.)

Options:

A.

Redundancy group 0 is only active on the cluster backup node.

B.

Each chassis cluster member requires a unique cluster ID value.

C.

Each chassis cluster member device can host active redundancy groups

D.

Chassis cluster member devices must be the same model.

Question 10

Which two statements are true about mixing traditional and unified security policies? (Choose two.)

Options:

A.

When a packet matches a unified security policy, the evaluation process terminates

B.

Traditional security policies must come before unified security policies

C.

Unified security policies must come before traditional security policies

D.

When a packet matches a traditional security policy, the evaluation process terminates

Question 11

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

Options:

A.

scalability

B.

no required software license

C.

granular security

D.

infinite number of interfaces

Question 12

Exhibit

You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.

Which statement is correct in this scenario?

Options:

A.

The security intelligence policy must be configured; on a unified security policy

B.

Use the commit full command to start the download.

C.

No action is required, the feeds take a few minutes to download.

D.

Set the maximum C&C entries within the Juniper ATP Cloud GUI.

Question 13

You want to set up JSA to collect network traffic flows from network devices on your network.

Which two statements are correct when performing this task? (Choose two.)

Options:

A.

BGP FlowSpec is used to collect traffic flows from Junos OS devices.

B.

Statistical sampling increases processor utilization

C.

Statistical sampling decreases event correlation accuracy.

D.

Superflows reduce traffic licensing requirements.

Question 14

You have deployed an SRX300 Series device and determined that files have stopped being scanned.

In this scenario, what is a reason for this problem?

Options:

A.

The software license is a free model and only scans executable type files.

B.

The infected host communicated with a command-and-control server, but it did not download malware.

C.

The file is too small to have a virus.

D.

You have exceeded the maximum files submission for your SRX platform size.

Question 15

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

Options:

A.

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.

B.

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.

C.

JIMS domain PC probes are triggered to map usernames to group membership information.

D.

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.

Question 16

You are asked to block malicious applications regardless of the port number being used.

In this scenario, which two application security features should be used? (Choose two.)

Options:

A.

AppFW

B.

AppQoE

C.

APPID

D.

AppTrack

Question 17

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Question 18

Which two statements are true about the vSRX? (Choose two.)

Options:

A.

AWS is supported as an laaS solution.

B.

AWS is not supported as an laaS solution.

C.

OpenStack is not supported as a cloud orchestration solution.

D.

OpenStack is supported as a cloud orchestration solution.

Question 19

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Dynamic analysis is always performed to determine if a file contains malware.

B.

If the cache lookup determines that a file contains malware, performed to verify the results.

C.

Dynamic analysis is not always necessary to determine if a file contains malware.

D.

If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results.

Question 20

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

Options:

A.

building blocks

B.

assets

C.

events

D.

tests

Question 21

Exhibit

Referring to the exhibit which statement is true?

Options:

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Question 22

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

Options:

A.

AppTrack

B.

AppQoS

C.

AppFW

D.

APPID

Question 23

You are asked to ensure that if the session table on your SRX Series device gets close to exhausting its resources, that you enforce a more aggress.ve age-out of existing flows.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the low-watermark value is met.

B.

The early-ageout configuration specifies the timeout value, in seconds, that will be applied once the high-watermark value is met.

C.

The high-watermark configuration specifies the percentage of how much of the session table is left before disabling a more aggressive age- out timer.

D.

The high-watermark configuration specifies the percentage of how much of the session table can be allocated before applying a more aggressive age-out timer

Question 24

You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.

In this scenario, what is the correct order for rebooting the devices?

Options:

A.

Reboot the secondary device, then the primary device.

B.

Reboot only the secondary device since the primary will assign itself the correct cluster and node ID.

C.

Reboot the primary device, then the secondary device.

D.

Reboot only the primary device since the secondary will assign itself the correct cluster and node ID.

Question 25

Which two statements are correct about a reth LAG? (Choose two.)

Options:

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Question 26

You are asked to create an IPS-exempt rule base to eliminate false positives from happening.

Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)

Options:

A.

source port

B.

source IP address

C.

destination IP address

D.

destination port

Question 27

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 28

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

Options:

A.

It decrypts the file in a sandbox.

B.

It validates the certificates used.

C.

It decrypts the data to validate the hash.

D.

It reviews the timing and frequency of the connections.

Question 29

After JSA receives external events and flows, which two steps occur? (Choose two.)

Options:

A.

After formatting the data, the data is stored in an asset database.

B.

Before formatting the data, the data is analyzed for relevant information.

C.

Before the information is filtered, the information is formatted

D.

After the information is filtered, JSA responds with active measures

Demo: 29 questions
Total 98 questions