1 / 11

Juniper JNCDS-SEC JN0-1332 Practice Test Questions

PassQuestion Juniper JNCDS-SEC JN0-1332 Practice Test Questions offer you real exam simulation and a virtual exam environment, which further helps you in familiarizing yourself with your exam.

Download Presentation

Juniper JNCDS-SEC JN0-1332 Practice Test Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. JN0-1332 Free Questions JN0-1332 Free Questions Security Design Specialist (JNCDS-SEC) Security Design Specialist (JNCDS-SEC) https://www.passquestion.com/ https://www.passquestion.com/JN0-1332 JN0-1332.html .html

  2. Question 1 Question 1 Which three statements about chassis clusters are true? Which three statements about chassis clusters are true? (Choose three.) (Choose three.) a) Branch SRX Series devices can form a cluster with any other branch SRX Series device. a) Branch SRX Series devices can form a cluster with any other branch SRX Series device. b) Only the same SRX Series models can form a cluster. b) Only the same SRX Series models can form a cluster. c) For SRX1500 clusters, the location and type of NPCs do not need to match in the two c) For SRX1500 clusters, the location and type of NPCs do not need to match in the two devices. devices. d) Fabric links must be connected using the same type of Ethernet connections. d) Fabric links must be connected using the same type of Ethernet connections. e) For SRX5800 clusters, the location and type of SPCs must match in the two devices. e) For SRX5800 clusters, the location and type of SPCs must match in the two devices. Answer: b, d, e Answer: b, d, e

  3. Question 2 Question 2 You are asked to implement a VPN connection between third-party and Juniper firewalls. You are asked to implement a VPN connection between third-party and Juniper firewalls. In this scenario, which VPN should you use? In this scenario, which VPN should you use? a) policy-based VPN, because routes cannot be shared between third-party and Juniper a) policy-based VPN, because routes cannot be shared between third-party and Juniper firewalls firewalls b) a route-based VPN, because it provides greater flexibility and separates security policies b) a route-based VPN, because it provides greater flexibility and separates security policies from the tunnels from the tunnels c) a policy-based VPN, because route-based VPNs do not allow for dynamic routing c) a policy-based VPN, because route-based VPNs do not allow for dynamic routing protocols to be used across tunnels protocols to be used across tunnels d) a DMVPN, because tunnel establishment occurs automatically across all firewalls d) a DMVPN, because tunnel establishment occurs automatically across all firewalls Answer: b Answer: b

  4. Question 3 Question 3 Which three types of scripts are available to automate functions in the Junos OS CLI? Which three types of scripts are available to automate functions in the Junos OS CLI? (Choose three.) (Choose three.) a) event scripts a) event scripts b) Java scripts b) Java scripts c) commit scripts c) commit scripts d) op scripts d) op scripts e) BASH scripts e) BASH scripts Answer: a, c, d Answer: a, c, d

  5. Question 4 Question 4 Which technology enables IPS inspection for users browsing websites that use Transport Layer Which technology enables IPS inspection for users browsing websites that use Transport Layer Security (TLS)? Security (TLS)? a) SSL reverse proxy a) SSL reverse proxy b) defense in-depth b) defense in-depth c) SSL forward proxy c) SSL forward proxy d) screens d) screens Answer: c Answer: c

  6. Question 5 Question 5 You need to hide all of your users behind a single IP address. Which type of address translation must You need to hide all of your users behind a single IP address. Which type of address translation must you use to accomplish this task? you use to accomplish this task? a) static NAT a) static NAT b) destination NAT b) destination NAT c) static PAT c) static PAT d) source NAT d) source NAT Answer: d Answer: d

  7. Question 6 Question 6 Due to government regulations, an ISP is responsible for protecting against malware and malicious Due to government regulations, an ISP is responsible for protecting against malware and malicious websites. You are asked to make feature recommendations. websites. You are asked to make feature recommendations. In this situation, which feature would you incorporate into your design? In this situation, which feature would you incorporate into your design? a) application firewall a) application firewall b) UTM b) UTM c) screens c) screens d) GeolP solution d) GeolP solution Answer: b Answer: b

  8. Question 7 Question 7 Which Juniper product or function provides dynamic command-and-control protection? Which Juniper product or function provides dynamic command-and-control protection? a) screens a) screens b) Unified Threat Management b) Unified Threat Management c) intrusion prevention system c) intrusion prevention system d) Policy Enforcer d) Policy Enforcer Answer: d Answer: d

  9. Question 8 Question 8 You need to establish a secure connection for remote users so they can access corporate resources You need to establish a secure connection for remote users so they can access corporate resources from their home computers. In this scenario, which type of VPN should you use? from their home computers. In this scenario, which type of VPN should you use? a) L2VPN a) L2VPN b) full-mesh b) full-mesh c) dynamic c) dynamic d) static d) static Answer: c Answer: c

  10. Question 9 Question 9 Which statement regarding BGP flowspec is true? Which statement regarding BGP flowspec is true? a) Import policies cannot be used with BGP flowspec NLRIs. a) Import policies cannot be used with BGP flowspec NLRIs. b) Flow updates received from external autonomous systems are automatically accepted. b) Flow updates received from external autonomous systems are automatically accepted. c) Flow updates are stored in the ~inetflow.0~ routing table. c) Flow updates are stored in the ~inetflow.0~ routing table. d) BGP flowspec can only be enabled on ~inet-vpn~ NLRIs. d) BGP flowspec can only be enabled on ~inet-vpn~ NLRIs. Answer: c Answer: c

  11. Question 10 Question 10 You want to protect your customer's servers in the DMZ from attacks that could be used to discover You want to protect your customer's servers in the DMZ from attacks that could be used to discover the operating system on hosts. Which type of attack are you trying to prevent? the operating system on hosts. Which type of attack are you trying to prevent? a) signature-based attack a) signature-based attack b) reconnaissance attack b) reconnaissance attack c) suspicious packet attack c) suspicious packet attack d) denial-of-service attack d) denial-of-service attack Answer: b Answer: b

More Related