Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which order is correct for Junos security devices that examine policies for transit traffic?

A.

zone policies

global policies

default policies

B.

default policies

zone policies

global policies

C.

default policies

global policies

zone policies

D.

global policies

zone policies

default policies

Full Access
Question # 5

You need to collect the serial number of an SRX Series device to replace it. Which command will accomplish this task?

A.

show chassis hardware

B.

show system information

C.

show chassis firmware

D.

show chassis environment

Full Access
Question # 6

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

A.

security policy

B.

host inbound traffic

C.

application layer gateway

D.

screen option

Full Access
Question # 7

Which two security features inspect traffic at Layer 7? (Choose two.)

A.

IPS/IDP

B.

security zones

C.

application firewall

D.

integrated user firewall

Full Access
Question # 8

You have an FTP server and a webserver on the inside of your network that you want to make available to users outside of the network. You are allocated a single public IP address.

In this scenario, which two NAT elements should you configure? (Choose two.)

A.

destination NAT

B.

NAT pool

C.

source NAT

D.

static NAT

Full Access
Question # 9

Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?

A.

firewall filters

B.

UTM

C.

Juniper ATP Cloud

D.

IPS

Full Access
Question # 10

Which Juniper ATP feed provides a dynamic list of known botnet servers and known sources of malware downloads?

A.

infected host cloud feed

B.

Geo IP feed

C.

C&C cloud feed

D.

blocklist feed

Full Access
Question # 11

You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file.

In this scenario, which command would accomplish this task?

A.

configure master

B.

cli privileged

C.

configure exclusive

D.

configure

Full Access
Question # 12

Which two components are configured for host inbound traffic? (Choose two.)

A.

zone

B.

logical interface

C.

physical interface

D.

routing instance

Full Access
Question # 13

When creating a site-to-site VPN using the J-Web shown in the exhibit, which statement is correct?

A.

The remote gateway is configured automatically based on the local gateway settings.

B.

RIP, OSPF, and BGP are supported under Routing mode.

C.

The authentication method is pre-shared key or certificate based.

D.

Privately routable IP addresses are required.

Full Access
Question # 14

Which two components are part of a security zone? (Choose two.)

A.

inet.0

B.

fxp0

C.

address book

D.

ge-0/0/0.0

Full Access
Question # 15

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Full Access