Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Security Professional (JNCIP-SEC) Question and Answers

Security Professional (JNCIP-SEC)

Last Update Apr 30, 2024
Total Questions : 115

We are offering FREE JN0-636 Juniper exam questions. All you do is to just go and sign up. Give your details, prepare JN0-636 free exam questions and then go for complete pool of Security Professional (JNCIP-SEC) test questions that will help you more.

JN0-636 pdf

JN0-636 PDF

$35  $99.99
JN0-636 Engine

JN0-636 Testing Engine

$42  $119.99
JN0-636 PDF + Engine

JN0-636 PDF + Testing Engine

$56  $159.99
Questions 1

You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and

only uses a single Phase 2 SA for both sites.

In this scenario, which VPN should be used?

Options:

A.  

An IPsec group VPN with the corporate firewall acting as the hub device.

B.  

Full mesh IPsec VPNs with tunnels between all sites.

C.  

A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.

D.  

A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.

Discussion 0
Questions 2

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

Options:

A.  

1

B.  

3

C.  

4

D.  

2

Discussion 0
Questions 3

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

Options:

A.  

The NAT resources must be defined in the security profile for the interconnect logical system.

B.  

No resources are needed to be allocated to the interconnect logical system.

C.  

The resources must be calculated based on the amount of traffic that will flow between the logical systems.

D.  

The flow-session resource must be defined in the security profile for the interconnect logical system.

Discussion 0
Questions 4

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

Options:

A.  

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.  

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.  

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.  

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Discussion 0
Questions 5

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

Options:

A.  

Mismatched proxy ID

B.  

Mismatched peer ID

C.  

Mismatched preshared key

D.  

Incorrect peer address.

Discussion 0
Questions 6

You want traffic to avoid the flow daemon for administrative task.

In this scenario which two stateless service are available with selective stateless packet based service. (Choose Two)

Options:

A.  

Layer 2 switching

B.  

IPv4 routing

C.  

IPsec

D.  

IPv6 routing

Discussion 0
Questions 7

You are asked to look at a configuration that is designed to take all traffic with a specific source ip address and forward the

traffic to a traffic analysis server for further evaluation. The configuration is no longer working as intended.

Referring to the exhibit which change must be made to correct the configuration?

Options:

A.  

Apply the filter as in input filter on interface xe-0/2/1.0

B.  

Apply the filter as in input filter on interface xe-0/0/1.0

C.  

Create a routing instance named default

D.  

Apply the filter as in output filter on interface xe-0/1/0.0

Discussion 0
Questions 8

Exhibit

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

Options:

A.  

Add multipoint to the st0.0 interface configuration on the branch1 device.

B.  

Change the IKE proposal-set to compatible on the branch1 and corporate devices.

C.  

Change the local identity to inet advpn on the branch1 device.

D.  

Change the IKE mode to aggressive on the branch1 and corporate devices.

Discussion 0
Questions 9

To analyze and detect malware, Juniper ATP Cloud performs which two functions? (Choose two.)

Options:

A.  

cache lookup: to see if the file is seen already and known to be malicious

B.  

antivirus scan: with a single vendor solution to see if the file contains any potential threats

C.  

dynamic analysis: to see what happens if you execute the file in a real environment

D.  

static analysis: to see what happens if you execute the file in a real environment

Discussion 0
Questions 10

Which two security intelligence feed types are supported?

Options:

A.  

infected host feed

B.  

Command and Control feed

C.  

custom feeds

D.  

malicious URL feed

Discussion 0
Questions 11

which two statements about the configuration shown in the exhibit are correct ?

Exhibit:

Options:

A.  

The remote IKE gateway IP address is 203.0.113.100.

B.  

The local peer is assigned a dynamic IP address.

C.  

The local IKE gateway IP address is 203.0.113.100.

D.  

The remote peer is assigned a dynamic IP address.

Discussion 0
Questions 12

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

Options:

A.  

The DNS doctoring ALG is not enabled by default.

B.  

The Proxy ARP feature must be configured.

C.  

The DNS doctoring ALG is enabled by default.

D.  

The DNS CNAME record is translated.

Discussion 0
Questions 13

you are connecting two remote sites to your corporate headquarters site. You must ensure that traffic

passes corporate headquarter.

In this scenario, which VPN should be used?

Options:

A.  

full mesh IPsec VPNs with tunnels between all sites

B.  

a full mesh Layer 3 VPN with the BGP route reflector behind the corporate firewall device

C.  

a Layer 3 VPN with the corporate firewall acting as the hub device

D.  

hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device

Discussion 0
Questions 14

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.  

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.  

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.  

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.  

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Discussion 0
Questions 15

Exhibit:

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

Options:

A.  

Modify the log-all term to add the next term action

B.  

Delete the log-all term

C.  

Add a term before the log-all term that blocks Telnet

D.  

Apply a firewall filter to the loopback interface that blocks Telnet traffic

Discussion 0
Questions 16

You are asked to control access to network resources based on the identity of an authenticated device

Which three steps will accomplish this goal on the SRX Series firewalls? (Choose three )

Options:

A.  

Configure an end-user-profile that characterizes a device or set of devices

B.  

Reference the end-user-profile in the security zone

C.  

Reference the end-user-profile in the security policy.

D.  

Apply the end-user-profile at the interface connecting the devices

E.  

Configure the authentication source to be used to authenticate the device

Discussion 0
Questions 17

Exhibit

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

Options:

A.  

IBGP

B.  

OSPF

C.  

IPsec

D.  

DHCP

E.  

NTP

Discussion 0
Questions 18

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

Options:

A.  

A maximum of 32 tenant systems can be configured on a physical SRX device.

B.  

All tenant systems share a single routing protocol process.

C.  

Each tenant system runs its own instance of the routing protocol process

D.  

A maximum of 500 tenant systems can be configured on a physical SRX device.

Discussion 0
Questions 19

Exhibit

You are using trace options to verity NAT session information on your SRX Series device

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.  

This packet is part of an existing session.

B.  

The SRX device is changing the source address on this packet from

C.  

This is the first packet in the session

D.  

The SRX device is changing the destination address on this packet 10.0.1 1 to 172 20.101.10.

Discussion 0
Questions 20

Exhibit:

The security trace options configuration shown in the exhibit is committed to your SRX series firewall. Which two statements are correct in this Scenario? (Choose Two)

Options:

A.  

The file debugger will be readable by all users.

B.  

Once the trace has generated 10 log files, older logs will be overwritten.

C.  

Once the trace has generated 10 log files, the trace process will halt.

D.  

The file debugger will be readable only by the user who committed this configuration

Discussion 0
Questions 21

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

Options:

A.  

200l:DB8:0:f101;:2

B.  

192.168.30.191

C.  

192.168.30.190

D.  

192.168.30.188

Discussion 0
Questions 22

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

Options:

A.  

Contrail Insights

B.  

MX Series device

C.  

Corero Smartwall TDD

D.  

SRX Series device

Discussion 0
Questions 23

Which two log format types are supported by the JATP appliance? (Choose two.)

Options:

A.  

YAML

B.  

XML

C.  

CSV

D.  

YANG

Discussion 0
Questions 24

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.  

request security polices resync

B.  

request service-deployment

C.  

request security polices check

D.  

restart security-intelligence

Discussion 0
Questions 25

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

Options:

A.  

Configure the tenant as TSYS1 for the pi security profile.

B.  

Configure the tenant as root for the pi security profile.

C.  

Configure the tenant as master for the pi security profile.

D.  

Configure the tenant as local for the pi security profile

Discussion 0
Questions 26

Exhibit.

A hub member of an ADVPN is not functioning correctly.

Referring the exhibit, which action should you take to solve the problem?

Options:

A.  

[edit interfaces]

root@vSRX-1# delete st0.0 multipoint

B.  

[edit interfaces]

user@hub-1# delete ipsec vpn advpn-vpn traffic-selector

C.  

[edit security]

user@hub-1# set ike gateway advpn-gateway advpn suggester disable

D.  

[edit security]

user@hub-1# delete ike gateway advpn-gateway advpn partner

Discussion 0
Questions 27

You configured a chassis cluster for high availability on an SRX Series device and enrolled this HA cluster with the Juniper ATP Cloud. Which two statements are correct in this scenario? (Choose two.)

Options:

A.  

You must use different license keys on both cluster nodes.

B.  

When enrolling your devices, you only need to enroll one node.

C.  

You must set up your HA cluster after enrolling your devices with Juniper ATP Cloud

D.  

You must use the same license key on both cluster nodes.

Discussion 0
Questions 28

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Options:

A.  

CAK is not used for encryption and decryption of the MACsec session.

B.  

SAK is successfully generated using this key.

C.  

CAK is used for encryption and decryption of the MACsec session.

D.  

SAK is not generated using this key.

Discussion 0
Questions 29

Exhibit

You are asked to establish an IBGP peering between the SRX Series device and the router, but the session is not being established. In the security flow trace on the SRX device, packet drops are observed as shown in the exhibit.

What is the correct action to solve the problem on the SRX device?

Options:

A.  

Create a firewall filter to accept the BGP traffic

B.  

Configure destination NAT for BGP traffic.

C.  

Add BGP to the Allowed host-inbound-traffic for the interface

D.  

Modify the security policy to allow the BGP traffic.

Discussion 0
Questions 30

You are connecting two remote sites to your corporate headquarters site. You must ensure that all traffic is secured and sent directly between sites In this scenario, which VPN should be used?

Options:

A.  

IPsec ADVPN

B.  

hub-and-spoke IPsec VPN

C.  

Layer 2 VPN

D.  

full mesh Layer 3 VPN with EBGP

Discussion 0
Questions 31

Exhibit

Referring to the exhibit, which three statements are true? (Choose three.)

Options:

A.  

The packet's destination is to an interface on the SRX Series device.

B.  

The packet's destination is to a server in the DMZ zone.

C.  

The packet originated within the Trust zone.

D.  

The packet is dropped before making an SSH connection.

E.  

The packet is allowed to make an SSH connection.

Discussion 0
Questions 32

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.  

The configured solution allows IPv6 to IPv4 translation.

B.  

The configured solution allows IPv4 to IPv6 translation.

C.  

The IPv6 address is invalid.

D.  

External hosts cannot initiate contact.

Discussion 0
Questions 33

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

Options:

A.  

LLDP-MED

B.  

IGMP snooping

C.  

RSTP

D.  

packet flooding

Discussion 0