Weekend Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Security - Specialist (JNCIS-SEC) Question and Answers

Security - Specialist (JNCIS-SEC)

Last Update May 9, 2024
Total Questions : 98

We are offering FREE JN0-335 Juniper exam questions. All you do is to just go and sign up. Give your details, prepare JN0-335 free exam questions and then go for complete pool of Security - Specialist (JNCIS-SEC) test questions that will help you more.

JN0-335 pdf

JN0-335 PDF

$35  $99.99
JN0-335 Engine

JN0-335 Testing Engine

$42  $119.99
JN0-335 PDF + Engine

JN0-335 PDF + Testing Engine

$56  $159.99
Questions 1

Which two statements are correct about Juniper ATP Cloud? (Choose two.)

Options:

A.  

Once the target threshold is met, Juniper ATP Cloud continues looking for threats from 0 to 5 minutes.

B.  

Once the target threshold is met, Juniper ATP Cloud continues looking for threats levels range from 0 to 10 minutes.

C.  

The threat levels range from 0-10.

D.  

The threat levels range from 0-100.

Discussion 0
Questions 2

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

Options:

A.  

Web proxy

B.  

client-protection

C.  

server-protection

D.  

DNS proxy

Discussion 0
Questions 3

Your JIMS server is unable to view event logs.

Which two actions would you take to solve this issue? (Choose two.)

Options:

A.  

Enable the correct host-inbound-traffic rules on the SRX Series devices.

B.  

Enable remote event log management within Windows Firewall on the necessary Exchange servers.

C.  

Enable remote event log management within Windows Firewall on the necessary domain controllers.

D.  

Enable remote event log management within Windows Firewall on the JIMS server.

Discussion 0
Questions 4

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

Options:

A.  

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.  

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.  

The fab interface enables configuration synchronization.

D.  

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Discussion 0
Questions 5

Which sequence does an SRX Series device use when implementing stateful session security policies using Layer 3 routes?

Options:

A.  

An SRX Series device will perform a security policy search before conducting a longest-match Layer 3 route table lookup.

B.  

An SRX Series device performs a security policy search before implementing an ALG security check on the longest-match Layer 3 route.

C.  

An SRX Series device will conduct a longest-match Layer 3 route table lookup before performing a security policy search.

D.  

An SRX Series device conducts an ALG security check on the longest-match route before performing a security policy search.

Discussion 0
Questions 6

Which two statements are true about Juniper ATP Cloud? (Choose two.)

Options:

A.  

Dynamic analysis is always performed to determine if a file contains malware.

B.  

If the cache lookup determines that a file contains malware, performed to verify the results.

C.  

Dynamic analysis is not always necessary to determine if a file contains malware.

D.  

If the cache lookup determines that a file contains malware, static analysis is not performed to verify the results.

Discussion 0
Questions 7

Which two statements about SRX Series device chassis clusters are correct? (Choose two.)

Options:

A.  

The chassis cluster data plane is connected with revenue ports.

B.  

The chassis cluster can contain a maximum of three devices.

C.  

The chassis cluster data plane is connected with SPC ports.

D.  

The chassis cluster can contain a maximum of two devices.

Discussion 0
Questions 8

Regarding static attack object groups, which two statements are true? (Choose two.)

Options:

A.  

Matching attack objects are automatically added to a custom group.

B.  

Group membership automatically changes when Juniper updates the IPS signature database.

C.  

Group membership does not automatically change when Juniper updates the IPS signature database.

D.  

You must manually add matching attack objects to a custom group.

Discussion 0
Questions 9

Which three statements about SRX Series device chassis clusters are true? (Choose three.)

Options:

A.  

Chassis cluster control links must be configured using RFC 1918 IP addresses.

B.  

Chassis cluster member devices synchronize configuration using the control link.

C.  

A control link failure causes the secondary cluster node to be disabled.

D.  

Recovery from a control link failure requires that the secondary member device be rebooted.

E.  

Heartbeat messages verify that the chassis cluster control link is working.

Discussion 0
Questions 10

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.  

Nancy logged in to the juniper.net Active Directory domain.

B.  

The IP address of Nancy's client PC is 172.25.11.

C.  

The IP address of the authenticating domain controller is 172.25.11.140.

D.  

Nancy is a member of the Active Directory sales group.

Discussion 0
Questions 11

Which two statements are true about the vSRX? (Choose two.)

Options:

A.  

It does not have VMXNET3 vNIC support.

B.  

It has VMXNET3 vNIC support.

C.  

UNIX is the base OS.

D.  

Linux is the base OS.

Discussion 0
Questions 12

Which solution enables you to create security policies that include user and group information?

Options:

A.  

JIMS

B.  

ATP Appliance

C.  

Network Director

D.  

NETCONF

Discussion 0
Questions 13

While working on an SRX firewall, you execute the show security policies policy-name detail command.

Which function does this command accomplish?

Options:

A.  

It displays details about the default security policy.

B.  

It identifies the different custom policies enabled.

C.  

It shows the system log files for the local SRX Series device.

D.  

It shows policy counters for a configured policy.

Discussion 0
Questions 14

Which two statements are true about application identification? (Choose two.)

Options:

A.  

Application identification can identity nested applications that are within Layer 7.

B.  

Application identification cannot identify nested applications that are within Layer 7.

C.  

Application signatures are the same as IDP signatures.

D.  

Application signatures are not the same as IDP signatures.

Discussion 0
Questions 15

Exhibit

Using the information from the exhibit, which statement is correct?

Options:

A.  

Redundancy group 1 is in an ineligible state.

B.  

Node1 is the active node for the control plane

C.  

There are no issues with the cluster.

D.  

Redundancy group 0 is in an ineligible state.

Discussion 0
Questions 16

You want to show tabular data for operational mode commands.

In this scenario, which logging parameter will provide this function?

Options:

A.  

permit

B.  

count

C.  

session-init

D.  

session-close

Discussion 0
Questions 17

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

Options:

A.  

It decrypts the file in a sandbox.

B.  

It validates the certificates used.

C.  

It decrypts the data to validate the hash.

D.  

It reviews the timing and frequency of the connections.

Discussion 0
Questions 18

Which two statements about the DNS ALG are correct? (Choose two.)

Options:

A.  

The DNS ALG supports DDNS.

B.  

The DNS ALG supports VPN tunnels.

C.  

The DNS ALG performs DNS doctoring.

D.  

The DNS ALG does not support NAT.

Discussion 0
Questions 19

On which three Hypervisors is vSRX supported? (Choose three.)

Options:

A.  

VMware ESXi

B.  

Citrix Hypervisor

C.  

Hyper-V

D.  

KVM

E.  

Oracle VM

Discussion 0
Questions 20

Which two statements are correct about chassis clustering? (Choose two.)

Options:

A.  

The node ID value ranges from 1 to 255.

B.  

The node ID is used to identify each device in the chassis cluster.

C.  

A system reboot is required to activate changes to the cluster.

D.  

The cluster ID is used to identify each device in the chassis cluster.

Discussion 0
Questions 21

Which statement about security policy schedulers is correct?

Options:

A.  

Multiple policies can use the same scheduler.

B.  

A policy can have multiple schedulers.

C.  

When the scheduler is disabled, the policy will still be available.

D.  

A policy without a defined scheduler will not become active

Discussion 0
Questions 22

You are asked to implement IPS on your SRX Series device.

In this scenario, which two tasks must be completed before a configuration will work? (Choose two.)

Options:

A.  

Download the IPS signature database.

B.  

Enroll the SRX Series device with Juniper ATP Cloud.

C.  

Install the IPS signature database.

D.  

Reboot the SRX Series device.

Discussion 0
Questions 23

Options:

A.  

IPS is integrated as a security service on SRX Series devices.

B.  

IPS uses sandboxinQ to detect unknown attacks.

C.  

IPS is a standalone platform running on dedicated hardware or as a virtual device.

D.  

IPS uses protocol anomaly rules to detect unknown attacks.

Discussion 0
Questions 24

You want to be alerted if the wrong password is used more than three times on a single device within five minutes.

Which Juniper Networks solution will accomplish this task?

Options:

A.  

Adaptive Threat Profiling

B.  

Juniper Secure Analytics

C.  

Juniper Identity Management Service

D.  

Intrusion Prevention System

Discussion 0
Questions 25

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

Options:

A.  

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.

B.  

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.

C.  

JIMS domain PC probes are triggered to map usernames to group membership information.

D.  

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.

Discussion 0
Questions 26

You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?

Options:

A.  

Connect JIMS to the RADIUS server

B.  

Connect JIMS to the domain Exchange server

C.  

Connect JIMS to the domain SQL server.

D.  

Connect JIMS to another SRX Series device.

Discussion 0
Questions 27

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

Options:

A.  

Enable AppQoS on the proper security zones

B.  

Enable APBR on the proper security zones

C.  

Enable screen options on the proper security zones

D.  

Enable AppTrack on the proper security zones.

Discussion 0
Questions 28

Click the Exhibit button.

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:

A.  

Add a security intelligence policy to the permit portion of the security policy.

B.  

Add an action to the permit portion of the security policy.

C.  

Add logging to the permit portion of the security policy.

D.  

Add a match rule to the security policy with an appropriate threat level.

Discussion 0
Questions 29

Exhibit

You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.

Which statement is correct in this scenario?

Options:

A.  

The security intelligence policy must be configured; on a unified security policy

B.  

Use the commit full command to start the download.

C.  

No action is required, the feeds take a few minutes to download.

D.  

Set the maximum C&C entries within the Juniper ATP Cloud GUI.

Discussion 0