Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You want to configure the SRX Series device to map two peer interfaces together and ensure that there is no switching or routing lookup to forward traffic.

Which feature on the SRX Series device is used to accomplish this task?

A.

Transparent mode

B.

Secure wire

C.

Mixed mode

D.

Switching mode

Full Access
Question # 5

You need to set up source NAT so that external hosts can initiate connections to an internal device, but only if a connection to the device was first initiated by the internal device.

Which type of NAT solution provides this functionality?

A.

Address persistence

B.

Persistent NAT with any remote host

C.

Persistent NAT with target host

D.

Static NAT

Full Access
Question # 6

An ADVPN configuration has been verified on both the hub and spoke devices and it seems fine. However, OSPF is not functioning as expected.

Referring to the exhibit, which two statements under interface st0.0 on both the hub and spoke devices would solve this problem? (Choose two.)

A.

interface-type p2mp

B.

dynamic-neighbors

C.

passive

D.

interface-type p2p

Full Access
Question # 7

Referring to the exhibit,

which two statements about User1 are true? (Choose two.)

A.

User1 has access to the configuration specific to their assigned logical system.

B.

User1 is logged in to logical system LSYS-1.

C.

User1 can add logical units to an interface that a primary administrator has not previously assigned.

D.

User1 can view outputs from other user logical systems.

Full Access
Question # 8

What are three attributes that APBR queries from the application system cache module. (Choose Three)

A.

TTL

B.

destination port

C.

service

D.

DSCP

E.

protocol type

Full Access
Question # 9

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Full Access
Question # 10

Which two statements about transparent mode and Ethernet switching mode on an SRX series

device are correct.

A.

In Ethernet switching mode, Layer 2 interfaces must be placed in a security zone.

B.

In Ethernet switching mode, IRB interfaces must be placed in a security zone.

C.

In transparent mode, Layer 2 interfaces must be placed in a security zone.

D.

In transparent mode, IRB interfaces must be placed in a security zone.

Full Access
Question # 11

Exhibit:

You are asked to ensure that Internet users can access the company's internal webserver using its FQDN. However, the internal DNS server's A record only points to the webserver's private address.

Referring to the exhibit, which two actions are required to complete this task? (Choose two.)

A.

Disable the DNS ALG.

B.

Configure static NAT for both the DNS server and the webserver.

C.

Configure destination NAT for both the DNS server and the webserver.

D.

Configure proxy ARP on ge-0/0/3.

Full Access
Question # 12

You want to enable transparent mode on your SRX series device.

In this scenario, which three actions should you perform? (Choose three.)

A.

Enable the ethernet-switching family on your Layer 2 interfaces

B.

Install a Layer 2 feature license.

C.

Reboot the SRX device.

D.

Ensure that no IRB interfaces are configured on the device.

E.

Add your Layer 2 interfaces to a security zone.

Full Access
Question # 13

You are using ADVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

Which two statements are true in this scenario? (Choose two.)

A.

ADVPN creates a full-mesh topology.

B.

IBGP routing is required.

C.

OSPF routing is required.

D.

Certificate-based authentication is required.

Full Access
Question # 14

Exhibit:

You created a Unified security policy called test on the network edge srx series firewall.

According to the firewall, this new security policy is not passing traffic.

Which two statements are correct in this scenario? (Choose two.)

A.

The test policy should be the last policy.

B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

C.

The source address cannot be any when a dynamic application is configured.

D.

The drop-http policy is a terminating rule and will drop the traffic.

Full Access
Question # 15

Referring to the exhibit,

which statement about TLS 1.2 traffic is correct?

A.

TLS 1.2 traffic will be sent to routing instance R1 but not forwarded to the next hop.

B.

TLS 1.2 traffic will be sent to routing instance R1 and forwarded to next hop 10.1.0.1.

C.

TLS 1.2 traffic will be sent to routing instance R2 but not forwarded to the next hop.

D.

TLS 1.2 traffic will be sent to routing instance R2 and forwarded to next hop 10.2.0.1.

Full Access
Question # 16

You are attempting to ping the IP address that is assigned to the loopback interface on the

SRX series device shown in the exhibit.

What is causing this problem?

A.

The loopback interface requires encapsulation.

B.

The loopback interface is not assigned to a security zone.

C.

The incorrect interface index ID is assigned to the loopback interface.

D.

The IP address on the loopback interface is a private address.

Full Access
Question # 17

Exhibit:

Referring to the exhibit, which IKE mode will be configured on the HQ-Gateway and Subsidiary-Gateway?

A.

Main mode on both the gateways

B.

Aggressive mode on both the gateways

C.

Main mode on the HQ-Gateway and aggressive mode on the Subsidiary-Gateway

D.

Aggressive mode on the HQ-Gateway and main mode on the Subsidiary-Gateway

Full Access
Question # 18

What are three core components for enabling advanced policy-based routing? (Choose three.)

A.

Filter-based forwarding

B.

Routing options

C.

Routing instance

D.

APBR profile

E.

Policies

Full Access
Question # 19

You are deploying threat remediation to endpoints connected through third-party devices.

In this scenario, which three statements are correct? (Choose three.)

A.

All third-party switches must support AAA/RADIUS and Dynamic Authorization Extensions to the RADIUS protocol.

B.

The connector uses an API to gather endpoint MAC address information from the RADIUS server.

C.

All third-party switches in the specified network are automatically mapped and registered with the RADIUS server.

D.

The connector queries the RADIUS server for the infected host endpoint details and initiates a change of authorization (CoA) for the infected host.

E.

The RADIUS server sends Status-Server messages to update infected host information to the connector.

Full Access
Question # 20

You are asked to configure tenant systems.

Which two statements are true in this scenario? (Choose two.)

A.

A tenant system can have only one administrator.

B.

After successful configuration, the changes are merged into the primary database for each tenant system.

C.

Tenant systems have their own configuration database.

D.

You can commit multiple tenant systems at a time.

Full Access
Question # 21

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

You cannot secure intra-VLAN traffic with a security policy on this device.

B.

You can secure inter-VLAN traffic with a security policy on this device.

C.

The device can pass Layer 2 and Layer 3 traffic at the same time.

D.

The device cannot pass Layer 2 and Layer 3 traffic at the same time.

Full Access
Question # 22

Exhibit:

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

A.

DS-Lite

B.

NAT444

C.

NAT46

D.

full cone NAT

Full Access
Question # 23

You are asked to create multiple virtual routers using a single SRX Series device. You must ensure that each virtual router maintains a unique copy of the routing protocol daemon (RPD) process.

Which solution will accomplish this task?

A.

Secure wire

B.

Tenant system

C.

Transparent mode

D.

Logical system

Full Access
Question # 24

You have cloud deployments in Azure, AWS, and your private cloud. You have deployed

multicloud using security director with policy enforcer to. Which three statements are true in this scenario? (Choose three.)

A.

You can run Juniper ATP scans only on traffic from your private cloud.

B.

You can run Juniper ATP scans for all three domains.

C.

You must secure the policies individually by domain.

D.

The Policy Enforcer is able to flag infected hosts in all three domains.

E.

You can simultaneously manage the security policies in all three domains.

Full Access
Question # 25

You Implement persistent NAT to allow any device on the external side of the firewall to

initiate traffic.

Referring to the exhibit, which statement is correct?

A.

The target-host parameter should be used instead of the any-remote-host parameter.

B.

The port-overloading parameter needs to be turned off in the NAT source interface configuration

C.

The target-host-port parameter should be used instead of the any-remote-host parameter

D.

The any-remote-host parameter does not support interface-based NAT and needs an IP pod to work.

Full Access
Question # 26

What is the advantage of using separate st0 logical units for each spoke connection?

A.

It is easy to configure even when managing many st0 units.

B.

It facilitates scalability.

C.

Junos devices can exchange NHTB data automatically using this method.

D.

It enables assignments of different settings to each logical unit.

Full Access
Question # 27

Click the Exhibit button.

You have configured a CoS-based VPN that is not functioning correctly.

Referring to the exhibit, which action will solve the problem?

A.

You must change the loss priorities of the forwarding classes to low.

B.

You must change the code point for the DB-data forwarding class to 10000.

C.

You must use inet precedence instead of DSCP.

D.

You must delete one forwarding class.

Full Access
Question # 28

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

It works with third-party switches.

B.

It provides endpoint protection by running a Juniper ATP Cloud agent on the servers.

C.

It provides endpoint protection by running a Juniper ATP Cloud agent on EX Series devices.

D.

It works with SRX Series devices.

Full Access
Question # 29

You are asked to see if your persistent NAT binding table is exhausted.

Which show command would you use to accomplish this task?

A.

show security nat source persistent-nat-table summary

B.

show security nat source summary

C.

show security nat source pool all

D.

show security nat source persistent-nat-table all

Full Access
Question # 30

Exhibit:

You are configuring NAT64 on your SRX Series device. You have committed the configuration shown in the exhibit. Unfortunately, the communication with the 10.10.201.10 server is not working. You have verified that the interfaces, security zones, and security policies are all correctly configured.

In this scenario, which action will solve this issue?

A.

Configure source NAT to translate return traffic from IPv4 address to the IPv6 address of your source device.

B.

Configure proxy-ARP on the external IPv4 interface for the 10.10.201.10/32 address.

C.

Configure proxy-NDP on the IPv6 interface for the 2001:db8::1/128 address.

D.

Configure destination NAT to translate return traffic from the IPv4 address to the IPv6 address of your source device.

Full Access
Question # 31

Exhibit:

Referring to the exhibit, which statement is true?

A.

SRG1 is configured in hybrid mode.

B.

The ICL is encrypted.

C.

If SRG1 moves to peer 2, peer 1 will drop packets sent to the SRG1 interfaces.

D.

If SRG1 moves to peer 2, peer 1 will forward packets sent to the SRG1 interfaces.

Full Access
Question # 32

You are setting up multinode HA for redundancy.

Which two statements are correct in this scenario? (Choose two.)

A.

Dynamic routing is active on one device at a time.

B.

Dynamic routing is active on both devices.

C.

Physical connections are used for the control and fabric links.

D.

ICL links require Layer 3 connectivity between peers.

Full Access
Question # 33

You are using AutoVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

In this scenario, which two statements are true? (Choose two.)

A.

New spoke sites can be added without explicit configuration on the hub.

B.

Direct spoke-to-spoke tunnels can be established automatically.

C.

All spoke-to-spoke IPsec communication will pass through the hub.

D.

AutoVPN requires OSPF over IPsec to discover and add new spokes.

Full Access
Question # 34

Exhibit:

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are not active and will not respond to ARP requests to the virtual IP MAC address.

B.

This device is the backup node for SRG1.

C.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are active and will respond to ARP requests to the virtual IP MAC address.

D.

This device is the active node for SRG1.

Full Access