Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Juniper JN0-636 Security, Professional (JNCIP-SEC) Exam Practice Test

Demo: 33 questions
Total 115 questions

Security, Professional (JNCIP-SEC) Questions and Answers

Question 1

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

Options:

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Question 2

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

Options:

A.

In the show security policies hit-count command output.

B.

In the show security flow statistics command output.

C.

In the show security policies detail command output.

D.

In the show firewall log command output.

Question 3

Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds.

Which two Juniper devices work in this situation? (Choose two)

Options:

A.

EX Series devices

B.

MX Series devices

C.

SRX Series devices

D.

QFX Series devices

Question 4

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The SRX-1 device can use the Proxy__Nodes feed in another security policy.

B.

You can use the Proxy_Nodes feed as the source-address and destination-address match criteria of another security policy on a different SRX Series device.

C.

The SRX-1 device creates the Proxy_wodes feed, so it cannot use it in another security policy.

D.

You can only use the Proxy_Node3 feed as the destination-address match criteria of another security policy on a different SRX Series device.

Question 5

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Question 6

Exhibit

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

Options:

A.

Add multipoint to the st0.0 interface configuration on the branch1 device.

B.

Change the IKE proposal-set to compatible on the branch1 and corporate devices.

C.

Change the local identity to inet advpn on the branch1 device.

D.

Change the IKE mode to aggressive on the branch1 and corporate devices.

Question 7

Exhibit:

The security trace options configuration shown in the exhibit is committed to your SRX series firewall. Which two statements are correct in this Scenario? (Choose Two)

Options:

A.

The file debugger will be readable by all users.

B.

Once the trace has generated 10 log files, older logs will be overwritten.

C.

Once the trace has generated 10 log files, the trace process will halt.

D.

The file debugger will be readable only by the user who committed this configuration

Question 8

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

Options:

A.

The DNS doctoring ALG is not enabled by default.

B.

The Proxy ARP feature must be configured.

C.

The DNS doctoring ALG is enabled by default.

D.

The DNS CNAME record is translated.

Question 9

Exhibit

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This is the last packet in the session.

B.

The SRX Series device is performing both source and destination NAT on this session.

C.

This is the first packet in the session.

D.

The SRX Series device is performing only source NAT on this session.

Question 10

Exhibit

Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.

Which two commands will solve this problem? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 11

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Question 12

Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

Options:

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

Question 13

What is the purpose of the Switch Microservice of Policy Enforcer?

Options:

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

Question 14

Which two types of source NAT translations are supported in this scenario? (Choose two.)

Options:

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Question 15

Click the Exhibit button.

Which type of NAT is shown in the exhibit?

Options:

A.

NAT46

B.

NAT64

C.

persistent NAT

D.

DS-Lite

Question 16

Exhibit

Your company recently acquired a competitor. You want to use using the same IPv4 address space as your company.

Referring to the exhibit, which two actions solve this problem? (Choose two)

Options:

A.

Configure static NAT on the SRX Series devices.

B.

Connect the competitor network using IPsec policy-based VPNs.

C.

Identify two neutral IPv4 address spaces for address translation.

D.

Configure IPsec Transport mode.

Question 17

Exhibit

Referring to the exhibit, which type of NAT is being performed?

Options:

A.

Static NAT

B.

Destination NAT

C.

Persistent NAT

D.

Source NAT

Question 18

In an effort to reduce client-server latency transparent mode was enabled an SRX series device.

Which two types of traffic will be permitted in this scenario? (Choose Two )

Options:

A.

ARP

B.

Layer 2 non-IP multicast

C.

BGP

D.

IPsec

Question 19

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

Options:

A.

VRF instances

B.

virtual router instances

C.

logical systems

D.

tenant systems

Question 20

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

Options:

A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Question 21

Which three type of peer devices are supported for Cos-Based IPsec VPN?

Options:

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

Question 22

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

Options:

A.

200l:DB8:0:f101;:2

B.

192.168.30.191

C.

192.168.30.190

D.

192.168.30.188

Question 23

Exhibit

You are not able to ping the default gateway of 192.168 100 1 (or your network that is located on your SRX Series firewall.

Referring to the exhibit, which two commands would correct the configuration of your SRX Series device? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 24

To analyze and detect malware, Juniper ATP Cloud performs which two functions? (Choose two.)

Options:

A.

cache lookup: to see if the file is seen already and known to be malicious

B.

antivirus scan: with a single vendor solution to see if the file contains any potential threats

C.

dynamic analysis: to see what happens if you execute the file in a real environment

D.

static analysis: to see what happens if you execute the file in a real environment

Question 25

Which two log format types are supported by the JATP appliance? (Choose two.)

Options:

A.

YAML

B.

XML

C.

CSV

D.

YANG

Question 26

Exhibit:

Referring to the exhibit, which two statements are correct?

Options:

A.

All of the entries are a threat level 8

B.

All of the entries are command and control entries.

C.

All of the entries are Dshield entries

D.

All of the entries are a threat level 10.

Question 27

Exhibit

Which statement is true about the output shown in the exhibit?

Options:

A.

The SRX Series device is configured with default security forwarding options.

B.

The SRX Series device is configured with packet-based IPv6 forwarding options.

C.

The SRX Series device is configured with flow-based IPv6 forwarding options.

D.

The SRX Series device is configured to disable IPv6 packet forwarding.

Question 28

Which two modes are supported on Juniper ATP Cloud? (Choose two.)

Options:

A.

global mode

B.

transparent mode

C.

private mode

D.

Layer 3 mode

Question 29

Exhibit

Options:

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Question 30

You are connecting two remote sites to your corporate headquarters site. You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?

Options:

A.

IPsec ADVPN

B.

hub-and-spoke IPsec VPN

C.

Layer 2 VPN

D.

full mesh Layer 3 VPN with EBGP

Question 31

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Question 32

Exhibit

Referring to the exhibit, which statement is true?

Options:

A.

This custom block list feed will be used before the Juniper Seclntel

B.

This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.

C.

This custom block list feed will be used instead of the Juniper Seclntel block list feed

D.

This custom block list feed will be used after the Juniper Seclntel block list feed.

Question 33

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

Options:

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Demo: 33 questions
Total 115 questions