Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You are enabling advanced policy-based routing. You have configured a static route that has a next hop from the inet.0 routing table. Unfortunately, this static route is not active in your routing instance.

In this scenario, which solution is needed to use this next hop?

A.

Use RIB groups.

B.

Use filter-based forwarding.

C.

Use transparent mode.

D.

Use policies.

Full Access
Question # 5

Your customer needs embedded security in an EVPN-VXLAN solution.

What are two benefits of adding an SRX Series device in this scenario? (Choose two.)

A.

It enhances tunnel inspection for VXLAN encapsulated traffic with Layer 4-7 security services.

B.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN underlay.

C.

It adds extra security with the capabilities of an enterprise-grade firewall in the EVPN-VXLAN overlay.

D.

It enhances tunnel inspection for VXLAN encapsulated traffic with only Layer 4 security services.

Full Access
Question # 6

Exhibit:

You are having problems configuring advanced policy-based routing.

What should you do to solve the problem?

A.

Apply a policy to the APBR RIB group to only allow the exact routes you need.

B.

Change the routing instance to a forwarding instance.

C.

Change the routing instance to a virtual router instance.

D.

Remove the default static route from the main instance configuration.

Full Access
Question # 7

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

C.

One security profile can only be applied to one logical system.

D.

One security profile can be applied to multiple logical systems.

Full Access
Question # 8

Exhibit:

Referring to the flow logs exhibit, which two statements are correct? (Choose two.)

A.

The packet is dropped by the default security policy.

B.

The packet is dropped by a configured security policy.

C.

The data shown requires a traceoptions flag of host-traffic.

D.

The data shown requires a traceoptions flag of basic-datapath.

Full Access
Question # 9

Referring to the exhibit,

which two statements are correct about the NAT configuration? (Choose two.)

A.

Both the internal and the external host can initiate a session after the initial translation.

B.

Only a specific host can initiate a session to the reflexive address after the initial session.

C.

Any external host will be able to initiate a session to the reflexive address.

D.

The original destination port is used for the source port for the session.

Full Access
Question # 10

Exhibit:

You are asked to ensure that Internet users can access the company's internal webserver using its FQDN. However, the internal DNS server's A record only points to the webserver's private address.

Referring to the exhibit, which two actions are required to complete this task? (Choose two.)

A.

Disable the DNS ALG.

B.

Configure static NAT for both the DNS server and the webserver.

C.

Configure destination NAT for both the DNS server and the webserver.

D.

Configure proxy ARP on ge-0/0/3.

Full Access
Question # 11

You are asked to create multiple virtual routers using a single SRX Series device. You must ensure that each virtual router maintains a unique copy of the routing protocol daemon (RPD) process.

Which solution will accomplish this task?

A.

Secure wire

B.

Tenant system

C.

Transparent mode

D.

Logical system

Full Access
Question # 12

What are three core components for enabling advanced policy-based routing? (Choose three.)

A.

Filter-based forwarding

B.

Routing options

C.

Routing instance

D.

APBR profile

E.

Policies

Full Access
Question # 13

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Full Access
Question # 14

You have deployed two SRX Series devices in an active/passive multinode HA scenario.

In this scenario, which two statements are correct? (Choose two.)

A.

Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.

B.

Services redundancy group 0 (SRG0) is used for services that have a control plane state.

C.

Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.

D.

Services redundancy group 1 (SRG1) is used for services that have a control plane state.

Full Access
Question # 15

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

A.

The session did not properly reclassify midstream to the correct APBR rule.

B.

IDP disable is not configured on the APBR rule.

C.

The application services bypass is not configured on the APBR rule.

D.

The APBR rule does a match on the first packet.

Full Access
Question # 16

Which two statements are true regarding NAT64? (Choose two.)

A.

An SRX Series device should be in packet-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv6.

C.

An SRX Series device should be in flow-based forwarding mode for IPv4.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Full Access
Question # 17

An ADVPN configuration has been verified on both the hub and spoke devices and it seems fine. However, OSPF is not functioning as expected.

Referring to the exhibit, which two statements under interface st0.0 on both the hub and spoke devices would solve this problem? (Choose two.)

A.

interface-type p2mp

B.

dynamic-neighbors

C.

passive

D.

interface-type p2p

Full Access
Question # 18

Exhibit:

Referring to the exhibit, which two statements are true? (Choose two.)

A.

Hosts in the Local zone can be enabled for control plane access to the SRX.

B.

An IRB interface is required to enable communication between the Trust and the Untrust zones.

C.

You can configure security policies for traffic flows between hosts in the Local zone.

D.

Hosts in the Local zone can communicate with hosts in the Trust zone with a security policy.

Full Access
Question # 19

Exhibit:

Referring to the exhibit, a default static route on SRX-1 sends all traffic to ISP-A. You have configured APBR to send all requests for streaming video traffic to ISP-B. However, the return traffic from the streaming video server is coming through ISP-A, and the traffic is being dropped by SRX-1. You can only make changes on SRX-1.

How do you solve this problem?

A.

Place both ISP-facing interfaces in the same zone.

B.

Change the APBR routing instance from a forwarding instance to a virtual router instance.

C.

Enable AppTrack to keep track of the sessions and zones for the streaming video traffic.

D.

Configure BGP to control the return path of the streaming video traffic.

Full Access