You configured a chassis cluster for high availability on an SRX Series device and enrolled this HA cluster with the Juniper ATP Cloud. Which two statements are correct in this scenario? (Choose two.)
You must use different license keys on both cluster nodes.
When enrolling your devices, you only need to enroll one node.
You must set up your HA cluster after enrolling your devices with Juniper ATP Cloud
You must use the same license key on both cluster nodes.
You must set up your HA cluster before enrolling your devices with Juniper ATP Cloud. And it is not necessary to use different license keys on both cluster nodes because the HA cluster shares the same license key.
The two statements that are correct in this scenario are:
References: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/security-atp-cloud-enrolling-srx-series.html https://www.juniper.net/documentation/en_US/junos/topics/concept/security-atp-cloud-licensing-overview.html
Exhibit
You are validating bidirectional traffic flows through your IPsec tunnel. The 4546 session represents traffic being sourced from the remote end of the IPsec tunnel. The 4547 session represents traffic that is sourced from the local network destined to the remote network.
Which statement is correct regarding the output shown in the exhibit?
The remote gateway address for the IPsec tunnel is 10.20.20.2
The session information indicates that the IPsec tunnel has not been established
The local gateway address for the IPsec tunnel is 10.20.20.2
NAT is being used to change the source address of outgoing packets
According to the output shown in the exhibit, which is a security flow session on an SRX Series device, the correct statement is that the local gateway address for the IPsec tunnel is 10.20.20.2. This is indicated by the line In: 10.20.20.2/2060 -> 10.20.20.1/3382, which shows that the source IP address of the incoming packet is 10.20.20.2, which is the local gateway address of the IPsec tunnel. The destination IP address of the incoming packet is 10.20.20.1, which is the remote gateway address of the IPsec tunnel.
The following statements are incorrect or not supported by the output:
References: 1: show security flow session - Technical Documentation - Support - Juniper Networks
What are two valid modes for the Juniper ATP Appliance? (Choose two.)
flow collector
event collector
all-in-one
core
The two valid modes for the Juniper ATP Appliance are all-in-one and core. The all-in-one mode is a single appliance that performs both the collector and the core functions. The collector function collects traffic from the network and sends it to the core function for analysis and detection. The core function performs the threat detection, mitigation, and analytics. The all-in-one mode is suitable for small to medium-sized networks that do not require high scalability or performance. The core mode is a dedicated appliance that performs only the core function. The core mode is used in conjunction with one or more collector appliances that collect traffic from the network and send it to the core appliance for analysis and detection. The core mode is suitable for large-scale networks that require high scalability and performance. References: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/concept/security-atp-appliance-overview.html
Exhibit
The show network-access aaa radius-servers command has been issued to solve authentication issues.
Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)
200l:DB8:0:f101;:2
192.168.30.191
192.168.30.190
192.168.30.188
The SRX Series device will continue to send requests to authentication servers 192.168.30.190 and 192.168.30.191. This is because the exhibit shows the output of the show network-access aaa radius-servers command. This command displays the status of the RADIUS servers configured on the device. In the output, we can see that there are three RADIUS servers configured - 192.168.30.190, 192.168.30.191, and 2001:DB8:0:f101::2. However, the status of the third server is shown as “DOWN”. This means that the device is not able to communicate with this server. Therefore, the device will continue to send requests to the other two servers - 192.168.30.190 and 192.168.30.191. References: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-network-access-aaa-radius-servers.html
You want to enforce I DP policies on HTTP traffic.
In this scenario, which two actions must be performed on your SRX Series device? (Choose two )
Choose an attacks type in the predefined-attacks-group HTTP-All.
Disable screen options on the Untrust zone.
Specify an action of None.
Match on application junos-http.
To enforce IDP policies on HTTP traffic on an SRX Series device, the following actions must be performed:
Disabling screen options on the Untrust zone and specifying an action of None are not necessary to enforce IDP policies on HTTP traffic. The first one is a feature used to prevent certain types of attacks, the second one is used to take no action in case of a match.
You are asked to share threat intelligence from your environment with third party tools so that those
tools can be identify and block lateral threat propagation from compromised hosts.
Which two steps accomplish this goal? (Choose Two)
Configure application tokens in the SRX Series firewalls to limit who has access
Enable Juniper ATP Cloud to share threat intelligence
Configure application tokens in the Juniper ATP Cloud to limit who has access
Enable SRX Series firewalls to share Threat intelligence with third party tool.
To share threat intelligence from your environment with third party tools, you need to enable Juniper ATP Cloud to share threat intelligence and configure application tokens in the Juniper ATP Cloud to limit who has access. The other options are incorrect because:
Therefore, the correct answer is B and C. You need to enable Juniper ATP Cloud to share threat intelligence and configure application tokens in the Juniper ATP Cloud to limit who has access. To do so, you need to perform the following steps:
References:
Exhibit
Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)
CAK is not used for encryption and decryption of the MACsec session.
SAK is successfully generated using this key.
CAK is used for encryption and decryption of the MACsec session.
SAK is not generated using this key.
The exhibit shows the output of the show security mka sessions summary command on an SRX Series device. This command displays the status of the MACsec Key Agreement (MKA) sessions on the device. In the output, we can see that there are two CAKs configured for the interface ge-0/0/1 - FFFF and EEEE. The CAK named FFFF has the type preceding and the status live. The CAK named EEEE has the type fallback and the status active.
The two statements that are true about the CAK status for the CAK named FFFF are:
References: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-mka-sessions-summary.html https://www.juniper.net/documentation/en_US/junos/topics/concept/security-macsec-overview.html
Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?
The number of traffic selectors configured for the VPN.
The number of CoS queues configured for the VPN.
The number of classifiers configured for the VPN.
The number of forwarding classes configured for the VPN.
In IPsec CoS-based VPNs, the number of IPsec Security Associations (SAs) associated with a peer is based on the number of forwarding classes configured for the VPN. The forwarding classes are used to classify and prioritize different types of traffic, such as voice and data traffic. Each forwarding class requires a separate IPsec SA to be established between the peers, in order to provide the appropriate level of security and quality of service for each type of traffic.
You are asked to control access to network resources based on the identity of an authenticated device
Which three steps will accomplish this goal on the SRX Series firewalls? (Choose three )
Configure an end-user-profile that characterizes a device or set of devices
Reference the end-user-profile in the security zone
Reference the end-user-profile in the security policy.
Apply the end-user-profile at the interface connecting the devices
Configure the authentication source to be used to authenticate the device
To control access to network resources based on the identity of an authenticated device on the SRX Series firewalls, you need to perform the following steps:
The other options are incorrect because:
References:
Exhibit
You are asked to establish an IBGP peering between the SRX Series device and the router, but the session is not being established. In the security flow trace on the SRX device, packet drops are observed as shown in the exhibit.
What is the correct action to solve the problem on the SRX device?
Create a firewall filter to accept the BGP traffic
Configure destination NAT for BGP traffic.
Add BGP to the Allowed host-inbound-traffic for the interface
Modify the security policy to allow the BGP traffic.
According to the security flow trace in the exhibit, the packets are dropped for self but not interested. This means that the SRX device is receiving packets destined to itself, but it does not have the corresponding service configured in the host-inbound-traffic stanza for the interface1. In this case, the service is BGP, which uses TCP port 179. Therefore, the correct action to solve the problem on the SRX device is to add BGP to the allowed host-inbound-traffic for the interface. This can be done by using the following command:
set security zones security-zone
This command will allow the SRX device to accept BGP packets on the specified interface and zone. Alternatively, the command can be applied to all interfaces in a zone by using the all-interfaces option2.
References: 1: SRX Getting Started - Troubleshoot Security Policy 2: Configuring System Services Allowed for Host Inbound Traffic
Which two features would be used for DNS doctoring on an SRX Series firewall? (Choose two.)
The DNS ALG must be enabled.
static NAT
The DNS ALG must be disabled.
source NAT
DNS doctoring is a feature that allows the SRX Series firewall to modify the IP address in a DNS response based on a static NAT rule. This can be useful when the DNS server returns an IP address that is not reachable by the client, such as a private IP address or an IP address from a different network. To use DNS doctoring, the following requirements must be met:
The monitor traffic interface command is being used to capture the packets destined to and the from the SRX Series device.
In this scenario, which two statements related to the feature are true? (Choose two.)
This feature does not capture transit traffic.
This feature captures ICMP traffic to and from the SRX Series device.
This feature is supported on high-end SRX Series devices only.
This feature is supported on both branch and high-end SRX Series devices.
https://forums.juniper.net/t5/Ethernet-Switching/monitor-traffic- interface/td-p/462528
You are asked to provide single sign-on (SSO) to Juniper ATP Cloud. Which two steps accomplish this goal? (Choose two.)
Configure Microsoft Azure as the service provider (SP).
Configure Microsoft Azure as the identity provider (IdP).
Configure Juniper ATP Cloud as the service provider (SP).
Configure Juniper ATP Cloud as the identity provider (IdP).
To provide single sign-on (SSO) to Juniper ATP Cloud, you need to configure the following:
Configuring Microsoft Azure as the service provider (SP) and Juniper ATP Cloud as the identity provider (IdP) are not the correct steps to provide SSO, as the roles are reversed.
In an effort to reduce client-server latency transparent mode was enabled an SRX series device.
Which two types of traffic will be permitted in this scenario? (Choose Two )
ARP
Layer 2 non-IP multicast
BGP
IPsec
To answer this question, you need to know what transparent mode is and what types of traffic it permits. Transparent mode is a mode of operation for SRX Series devices that provides Layer 2 bridging capabilities with full security services. In transparent mode, the SRX Series device acts as a bridge between two network segments and inspects the packets without modifying the source or destination information in the IP packet header. The SRX Series device does not have an IP address in transparent mode, except for the management interface1. Therefore, the types of traffic that will be permitted in transparent mode are:
The other options are incorrect because:
References:
You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE
Which command would be used to solve the problem?
request security polices resync
request service-deployment
request security polices check
restart security-intelligence
https://kb.juniper.net/InfoCenter/index?page=content &id=KB30443&cat=SRX_SERIES&actp=LIST
Exhibit
Referring to the exhibit, which three statements are true? (Choose three.)
The packet's destination is to an interface on the SRX Series device.
The packet's destination is to a server in the DMZ zone.
The packet originated within the Trust zone.
The packet is dropped before making an SSH connection.
The packet is allowed to make an SSH connection.
According to the exhibit, which is a security flow trace on an SRX Series device, the following statements are true:
The following statements are false:
References: 1: SRX Getting Started - Troubleshoot Security Policy 2: SRX Getting Started - Configure Security Zones
In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)
Send a custom message
Close the connection.
Drop the connection silently.
Quarantine the host.
In Juniper ATP Cloud, a threat prevention policy allows you to define how the system should handle an infected host. Two of the available actions are:
Sending a custom message is used to notify the user and administrator of the action taken. Drop the connection silently is not an action available in Juniper ATP Cloud.
According to the Juniper documentation, the threat prevention policy in Juniper ATP Cloud is a configuration that defines the actions and notifications for different threat levels of the traffic. The threat levels are based on the verdicts returned by Juniper ATP Cloud after analyzing the files, URLs, and domains. The threat levels range from 1 to 10, where 1 is the lowest and 10 is the highest1.
The threat prevention policy allows the user to specify different actions for different threat levels. The actions can be applied to the traffic or to the infected host. The actions available for the traffic are:
The actions available for the infected host are:
Therefore, the two different actions available in a threat prevention policy to deal with an infected host are:
The following actions are not available or incorrect:
References: 1: Configuring Threat Prevention Policies
Which two security intelligence feed types are supported?
infected host feed
Command and Control feed
custom feeds
malicious URL feed
The two security intelligence feed types that are supported are:
The other options are incorrect because:
References:
You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?
8080
443
80
22
This is the port used for encrypted communication between the SRX series device and the Juniper ATP Appliance
In order to enroll an SRX Series device with Juniper ATP Appliance, the firewall device must have port 443 open. Port 443 is the default port used for HTTPS traffic, the communication between the SRX Series device and the ATP Appliance needs to be encrypted, that's why this port should be opened.
You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.
In this scenario, which solution would you choose?
VRF instances
virtual router instances
logical systems
tenant systems
A logical system is a virtualization feature in SRX Series devices that allows you to create multiple, isolated virtual routers within a single physical device. Each logical system has its own routing table, firewall policies, and interfaces, and it can be managed and configured independently of the other logical systems. Logical systems are an effective way to isolate different administrative domains and to support a large number of virtualized instances.
According to the Juniper documentation, the solution that would best meet the requirements of deploying a virtualization solution with the security devices in the network is logical systems. Logical systems are a feature that allows the SRX Series device to be partitioned into multiple logical devices, each with its own discrete administrative domain, routing table, firewall policies, VPNs, and interfaces1. Each logical system can support up to 100 virtualized instances, depending on the SRX Series model and the available resources2.
The following solutions are not suitable or incorrect for this scenario:
References: 1: Understanding Logical Systems 2: SRX Series Logical Systems Feature Guide 3: vrf (Routing Instances) : [virtual-router (Routing Instances)] : [Understanding Tenant Systems]
Exhibit.
Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.
Which two commands will solve this problem? (Choose two.)
[edit interfaces]
user@srx# delete st0.0 multipoint
[edit security ike gateway advpn-gateway]
user@srx# delete advpn partner
[edit security ike gateway advpn-gateway]
user@srx# set version v1-only
[edit security ike gateway advpn-gateway]
user@srx# set advpn suggester disable
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
Exhibit
Which statement is true about the output shown in the exhibit?
The SRX Series device is configured with default security forwarding options.
The SRX Series device is configured with packet-based IPv6 forwarding options.
The SRX Series device is configured with flow-based IPv6 forwarding options.
The SRX Series device is configured to disable IPv6 packet forwarding.
The output shown in the exhibit is from the command “show security flow session family inet6”. This command displays the IPv6 flow sessions on the SRX Series device. The output shows that there are two total sessions, both of which are valid. This means that the SRX Series device is configured with flow-based IPv6 forwarding options. Flow-based IPv6 forwarding options enable the device to process IPv6 packets using the security policies, NAT, and other security features. To configure flow-based IPv6 forwarding options, use the command set security forwarding-options family inet6 mode flow-based and reboot the device. References:
you configured a security policy permitting traffic from the trust zone to the untrust zone but your
traffic not hitting the policy.
In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?
show security policy-report
show security application-tracking counters
show security match-policies
request security policies check
To troubleshoot the traffic problem using the match criteria, you need to use the show security match-policies CLI command. The other options are incorrect because:
Therefore, the correct answer is C. You need to use the show security match-policies CLI command to troubleshoot the traffic problem using the match criteria. The show security match-policies CLI command displays the policies that match the specified criteria, such as the source and destination addresses, the zones, the protocols, and the ports. It also shows the action and the hit count of each matching policy. You can use this command to verify if the traffic is matching the expected policy or not, and if not, what policy is blocking or rejecting the traffic4
which two statements about the configuration shown in the exhibit are correct ?
Exhibit:
The remote IKE gateway IP address is 203.0.113.100.
The local peer is assigned a dynamic IP address.
The local IKE gateway IP address is 203.0.113.100.
The remote peer is assigned a dynamic IP address.
The two statements about the configuration shown in the exhibit are correct are:
The other statements are incorrect because:
References:
you are connecting two remote sites to your corporate headquarters site. You must ensure that traffic
passes corporate headquarter.
In this scenario, which VPN should be used?
full mesh IPsec VPNs with tunnels between all sites
a full mesh Layer 3 VPN with the BGP route reflector behind the corporate firewall device
a Layer 3 VPN with the corporate firewall acting as the hub device
hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device
You are connecting two remote sites to your corporate headquarters site. You must ensure that traffic passes through the corporate headquarters. In this scenario, the VPN that should be used is:
The other options are incorrect because:
References:
Exhibit
Referring to the exhibit, which two statements are true? (Choose two.)
The data that traverses the ge-0/070 interface is secured by a secure association key.
The data that traverses the ge-070/0 interface can be intercepted and read by anyone.
The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.
The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.
The exhibit shows the output of the show security macsec statistics interface ge-0/0/70 detail command on an SRX Series device. This command displays the statistics for the Media Access Control Security (MACsec) feature on the ge-0/0/70 interface. MACsec is a feature that provides point-to-point security on Ethernet links by using encryption and data integrity checks. MACsec uses two types of keys to secure the traffic: the Connectivity Association Key (CAK) and the Secure Association Key (SAK). The CAK is used for authentication and key exchange between the MACsec peers. The SAK is used for encryption and decryption of the MACsec traffic.
The two statements that are true based on the exhibit are:
References: Juniper Security, Professional (JNCIP-SEC) Reference Materials source and documents: https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-macsec-statistics-interface-detail.html https://www.juniper.net/documentation/en_US/junos/topics/concept/security-macsec-overview.html
All interfaces involved in transparent mode are configured with which protocol family?
mpls
bridge
inet
ethernet — switching
In transparent mode, all interfaces involved are configured with the bridge protocol family. This allows the SRX device to act as a bridge between the interfaces and forward traffic transparently without any modification. The bridge interfaces can be configured to forward traffic based on layer 2 headers, such as MAC addresses, without the need for routing or IP addressing.
Which two log format types are supported by the JATP appliance? (Choose two.)
YAML
XML
CSV
YANG
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/topic-map/jatp-custom-log-ingestion.html
Exhibit:
Referring to the exhibit, the operator user is unable to save configuration files to a usb stick the is
plugged into SRX. What should you do to solve this problem?
Add the floppy permission flag to the operations class
Add the system-control permission flag to the operation class
Add the interface-control permission flag to the operation class
Add the system permission flag to the operation class
To solve the problem of the operator user being unable to save configuration files to a USB stick that is plugged into SRX, you need to add the system-control permission flag to the operations class. The other options are incorrect because:
Therefore, the correct answer is B. You need to add the system-control permission flag to the operations class to solve the problem. The system-control permission flag allows the user to perform system-level operations, such as rebooting, halting, or snapshotting the device1. These operations are required to mount, unmount, and copy files to and from the USB drive2. To add the system-control permission flag to the operations class, you need to perform the following steps:
References: