New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What does the number ‘’2’’ indicate in interface ge—0/1/2?

A.

The interface logical number

B.

The physical interface card (PIC)

C.

The port number

D.

The flexible PIC concentrator (FPC)

Full Access
Question # 5

Click the Exhibit button.

Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)

A.

The DMZ routing-instance is the source.

B.

The 10.10.102.10 IP address is the source.

C.

The 10.10.102.10 IP address is the destination.

D.

The DMZ routing-instance is the destination.

Full Access
Question # 6

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

A.

the content filtering UTM feature

B.

the antivirus UTM feature

C.

the Web filtering UTM feature

D.

the antispam UTM feature

Full Access
Question # 7

When configuring antispam, where do you apply any local lists that are configured?

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Full Access
Question # 8

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

A.

security policy

B.

host inbound traffic

C.

application layer gateway

D.

screen option

Full Access
Question # 9

What is the default timeout value for TCP sessions on an SRX Series device?

A.

30 seconds

B.

60 minutes

C.

60 seconds

D.

30 minutes

Full Access
Question # 10

Which two statements about the Junos OS CLI are correct? (Choose two.)

A.

The default configuration requires you to log in as the admin user.

B.

A factory-default login assigns the hostname Amnesiac to the device.

C.

Most Juniper devices identify the root login prompt using the % character.

D.

Most Juniper devices identify the root login prompt using the > character.

Full Access
Question # 11

Which two features are included with UTM on an SRX Series device? (Choose two.)

A.

antivirus

B.

NAT

C.

IDP

D.

content filtering

Full Access
Question # 12

Which statement is correct about global security policies on SRX Series devices?

A.

The to-zone any command configures a global policy.

B.

The from-zone any command configures a global policy.

C.

Global policies are always evaluated first.

D.

Global policies can include zone context.

Full Access
Question # 13

Which statement about service objects is correct?

A.

All applications are predefined by Junos.

B.

All applications are custom defined by the administrator.

C.

All applications are either custom or Junos defined.

D.

All applications in service objects are not available on the vSRX Series device.

Full Access
Question # 14

Which two services does Juniper Connected Security provide? (Choose two.)

A.

protection against zero-day threats

B.

IPsec VPNs

C.

Layer 2 VPN tunnels

D.

inline malware blocking

Full Access
Question # 15

What is the default value of the dead peer detection (DPD) interval for an IPsec VPN tunnel?

A.

20 seconds

B.

5 seconds

C.

10 seconds

D.

40 seconds

Full Access
Question # 16

You need to collect the serial number of an SRX Series device to replace it. Which command will accomplish this task?

A.

show chassis hardware

B.

show system information

C.

show chassis firmware

D.

show chassis environment

Full Access
Question # 17

An application firewall processes the first packet in a session for which the application has not yet been identified.

In this scenario, which action does the application firewall take on the packet?

A.

It allows the first packet.

B.

It denies the first packet and sends an error message to the user.

C.

It denies the first packet.

D.

It holds the first packet until the application is identified.

Full Access
Question # 18

Which IPsec protocol is used to encrypt the data payload?

A.

ESP

B.

IKE

C.

AH

D.

TCP

Full Access
Question # 19

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

A.

IDP signature feed

B.

C&C cloud feed

C.

infected host cloud feed

D.

US CERT threat feed

Full Access
Question # 20

Which statement about global NAT address persistence is correct?

A.

The same IP address from a source NAT pool will be assigned for all sessions from a given host.

B.

The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.

C.

The same IP address from a destination NAT pool will be assigned for all sessions for a given host.

D.

The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.

Full Access
Question # 21

Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?

A.

firewall filters

B.

UTM

C.

Juniper ATP Cloud

D.

IPS

Full Access
Question # 22

Which statement about NAT is correct?

A.

Destination NAT takes precedence over static NAT.

B.

Source NAT is processed before security policy lookup.

C.

Static NAT is processed after forwarding lookup.

D.

Static NAT takes precedence over destination NAT.

Full Access
Question # 23

Which two components are part of a security zone? (Choose two.)

A.

inet.0

B.

fxp0

C.

address book

D.

ge-0/0/0.0

Full Access
Question # 24

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.

Which Juniper ATP feature should you configure to accomplish this task?

A.

IPsec

B.

static NAT

C.

allowlists

D.

C&C feeds

Full Access
Question # 25

What are two functions of Juniper ATP Cloud? (Choose two.)

A.

malware inspection

B.

Web content filtering

C.

DDoS protection

D.

Geo IP feeds

Full Access
Question # 26

Which statement is correct about static NAT?

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Full Access
Question # 27

Which two security features inspect traffic at Layer 7? (Choose two.)

A.

IPS/IDP

B.

security zones

C.

application firewall

D.

integrated user firewall

Full Access
Question # 28

What is the correct order in which interface names should be identified?

A.

system slot number –> interface media type –> port number –> line card slot number

B.

system slot number –> port number –> interface media type –> line card slot number

C.

interface media type –> system slot number –> line card slot number –> port number

D.

interface media type –> port number –> system slot number –> line card slot number

Full Access
Question # 29

You want to enable the minimum Juniper ATP services on a branch SRX Series device.

In this scenario, what are two requirements to accomplish this task? (Choose two.)

A.

Install a basic Juniper ATP license on the branch device.

B.

Configure the juniper-atp user account on the branch device.

C.

Register for a Juniper ATP account on https://sky.junipersecurity.net.

D.

Execute the Juniper ATP script on the branch device.

Full Access
Question # 30

Which two statements are true about Juniper ATP Cloud? (Choose two.)

A.

Juniper ATP Cloud is an on-premises ATP appliance.

B.

Juniper ATP Cloud can be used to block and allow IPs.

C.

Juniper ATP Cloud is a cloud-based ATP subscription.

D.

Juniper ATP Cloud delivers intrusion protection services.

Full Access
Question # 31

Exhibit.

Which two statements are correct referring to the output shown in the exhibit? (Choose two.)

A.

FTP and ping access for the Trust-DMZ-Access policy is permitted.

B.

FTP and ping access for the Trust-DMZ-Access policy is denied.

C.

The SSH access for the Trust-DMZ-Block policy is permitted.

D.

The SSH access for the Trust-DMZ-Block policy is denied.

Full Access