Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

JN0-335 Security, Specialist (JNCIS-SEC) Questions and Answers

Questions 4

Exhibit

JN0-335 Question 4

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

JN0-335 Question 4

B)

JN0-335 Question 4

C)

JN0-335 Question 4

D)

JN0-335 Question 4

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Buy Now
Questions 6

Exhibit

JN0-335 Question 6

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Buy Now
Questions 7

You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair.

Which step is necessary to accomplish this task?

Options:

A.

Issue the set chassis cluster disable reboot command on the primary node.

B.

Implement the control link recover/ solution before adjusting the priorities.

C.

Manually request the failover and identify the secondary node

D.

Adjust the priority in the configuration on the secondary node.

Buy Now
Questions 8

Exhibit

JN0-335 Question 8

Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)

Options:

A.

forward proxy

B.

client protection proxy

C.

server protection proxy

D.

reverse proxy

Buy Now
Questions 9

Which two statements about SRX Series device chassis clusters are true? (Choose two.)

Options:

A.

Redundancy group 0 is only active on the cluster backup node.

B.

Each chassis cluster member requires a unique cluster ID value.

C.

Each chassis cluster member device can host active redundancy groups

D.

Chassis cluster member devices must be the same model.

Buy Now
Questions 10

Exhibit

JN0-335 Question 10

Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

Options:

A.

The session-class parameter in only used when troubleshooting.

B.

The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.

C.

Every session that enters the SRX Series device will generate an event

D.

Replacing the session-init parameter with session-lose will log unidentified flows.

Buy Now
Questions 11

Which statement defines the function of an Application Layer Gateway (ALG)?

Options:

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Buy Now
Questions 12

Which two statements are correct about AppTrack? (Choose two.)

Options:

A.

AppTrack can be configured for any defined logical system on an SRX Series device.

B.

AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.

C.

AppTrack collects traffic flow information including byte, packet, and duration statistics.

D.

AppTrack can only be configured in the main logical system on an SRX Series device.

Buy Now
Questions 13

You are configuring logging for a security policy.

In this scenario, in which two situations would log entries be generated? (Choose two.)

Options:

A.

every 10 minutes

B.

at session initialization

C.

every 60 seconds

D.

at session close

Buy Now
Questions 14

Which two functions does Juniper ATP Cloud perform to reduce delays in the inspection of files? (Choose two.)

Options:

A.

Juniper ATP Cloud allows the creation of allowlists.

B.

Juniper ATP Cloud uses a single antivirus software package to analyze files.

C.

Juniper ATP Cloud allows end users to bypass the inspection of files.

D.

Juniper ATP Cloud performs a cache lookup on files.

Buy Now
Questions 15

Which solution enables you to create security policies that include user and group information?

Options:

A.

JIMS

B.

ATP Appliance

C.

Network Director

D.

NETCONF

Buy Now
Questions 16

Which two sources are used by Juniper Identity Management Service (JIMS) for collecting username and device IP addresses? (Choose two.)

Options:

A.

Microsoft Exchange Server event logs

B.

DNS

C.

Active Directory domain controller event logs

D.

OpenLDAP service ports

Buy Now
Questions 17

Exhibit

JN0-335 Question 17

You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.

Which statement is correct in this scenario?

Options:

A.

The security intelligence policy must be configured; on a unified security policy

B.

Use the commit full command to start the download.

C.

No action is required, the feeds take a few minutes to download.

D.

Set the maximum C&C entries within the Juniper ATP Cloud GUI.

Buy Now
Questions 18

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.

Juniper ATP Cloud only uses one antivirus software package to analyze files.

B.

Juniper ATP Cloud uses multiple antivirus software packages to analyze files.

C.

Juniper ATP Cloud uses antivirus software packages to protect against zero-day threats.

D.

Juniper ATP Cloud does not use antivirus software packages to protect against zero-day threats.

Buy Now
Questions 19

Exhibit

JN0-335 Question 19

When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)

Options:

A.

The SSL proxy certificate ID is part of a blocklist.

B.

The SSL proxy certificate ID does not have the correct renegotiation option set.

C.

The SSL proxy certificate ID is for a forwarding proxy.

D.

The SSL proxy certificate ID does not exist.

Buy Now
Questions 20

Which two statements are correct about JSA data collection? (Choose two.)

Options:

A.

The Event Collector collects information using BGP FlowSpec.

B.

The Flow Collector can use statistical sampling

C.

The Flow Collector parses logs.

D.

The Event Collector parses logs

Buy Now
Questions 21

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

Options:

A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.

The fab interface enables configuration synchronization.

D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Buy Now
Questions 22

Your manager asks you to provide firewall and NAT services in a private cloud.

Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

Options:

A.

a single vSRX

B.

a vSRX for firewall services and a separate vSRX for NAT services

C.

a cSRX for firewall services and a separate cSRX for NAT services

D.

a single cSRX

Buy Now
Questions 23

Which two statements about SRX chassis clustering are correct? (Choose two.)

Options:

A.

SRX chassis clustering supports active/passive and active/active for the data plane.

B.

SRX chassis clustering only supports active/passive for the data plane.

C.

SRX chassis clustering supports active/passive for the control plane.

D.

SRX chassis clustering supports active/active for the control plane.

Buy Now
Questions 24

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.

Download the IPS signature database.

B.

Enroll the SRX Series device with Juniper ATP Cloud.

C.

Install the IPS signature database.

D.

Reboot the SRX Series device.

Buy Now
Questions 25

Exhibit

JN0-335 Question 25

Referring to the exhibit, what do you determine about the status of the cluster.

Options:

A.

Both nodes determine that they are in a primary state.

B.

Node 1 is down

C.

Node 2 is down.

D.

There are no issues with the cluster.

Buy Now
Questions 26

Click the Exhibit button.

JN0-335 Question 26

Which two statements describe the output shown in the exhibit? (Choose two.)

Options:

A.

Redundancy group 1 experienced an operational failure.

B.

Redundancy group 1 was administratively failed over.

C.

Node 0 is controlling traffic for redundancy group 1.

D.

Node 1 is controlling traffic for redundancy group 1.

Buy Now
Questions 27

You are deploying a new SRX Series device and you need to log denied traffic.

In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)

Options:

A.

session-init

B.

session-close

C.

deny

D.

count

Buy Now
Questions 28

While working on an SRX firewall, you execute the show security policies policy-name detail command.

Which function does this command accomplish?

Options:

A.

It displays details about the default security policy.

B.

It identifies the different custom policies enabled.

C.

It shows the system log files for the local SRX Series device.

D.

It shows policy counters for a configured policy.

Buy Now
Questions 29

Which two statements about SRX Series device chassis clusters are correct? (Choose two.)

Options:

A.

The chassis cluster data plane is connected with revenue ports.

B.

The chassis cluster can contain a maximum of three devices.

C.

The chassis cluster data plane is connected with SPC ports.

D.

The chassis cluster can contain a maximum of two devices.

Buy Now
Exam Code: JN0-335
Exam Name: Security, Specialist (JNCIS-SEC)
Last Update: Apr 18, 2024
Questions: 98

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now JN0-335 testing engine

PDF (Q&A)

$35  $99.99
buy now JN0-335 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 25 Apr 2024