Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JN0-334 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is JN0-335

JN0-334 Exam Dumps - Security-Specialist (JNCIS-SEC)

Question # 4

Click the Exhibit button.

You have configured the scheduler shown in the exhibit to prevent users from accessing certain websites from 1:00 PM to 3:00 PM Monday through Friday. This policy will remain in place until further notice. When testing the policy, you determine that the websites are still accessible during the restricted times.

In this scenario, which two actions should you perform to solve the problem? (Choose two.)

A.

Add the saturday exclude parameter and the sunday exclude parameter to ensure weekends are

excluded from the schedule.

B.

Use the 13:00 parameter and the 15:00 parameter when specifying the time.

C.

Use the start-date parameter to specify the date for each Monday and use the stop-date parameter to specify the date for each Friday.

D.

Use the PM parameter when specifying the time in the schedule.

Full Access
Question # 5

Click the Exhibit button.

Which two statements are true about the session shown in the exhibit? (Choose two.)

A.

Two security policies are required for bidirectional traffic flow.

B.

The ALG was enabled by manual configuration.

C.

The ALG was enabled by default.

D.

One security policy is required for bidirectional traffic flow.

Full Access
Question # 6

Click the Exhibit button.

Referring to the configuration shown in the exhibit, which two statements are true? (Choose two.)

A.

The log is being stored on the local Routing Engine.

B.

The log is being sent to a remote server.

C.

The syslog is configured for a user facility.

D.

The syslog is configured for an info facility.

Full Access
Question # 7

What are two management methods for cSRX? (Choose two.)

A.

Network Director

B.

J-Web

C.

CLI

D.

Contrail

Full Access
Question # 8

How many nodes are configurable in a chassis cluster using SRX Series devices?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 9

Which two statements describe SSL proxy on SRX Series devices? (Choose two.)

A.

SSL proxy supports TLS version 1.2.

B.

Client-protection is also known as reverse proxy.

C.

SSL proxy is supported when enabled within logical systems.

D.

SSL proxy relies on Active Directory to provide secure communication.

Full Access
Question # 10

Click the Exhibit button.

Referring to the SRX Series flow module diagram shown in the exhibit, where is IDP/IPS processed?

A.

Forwarding Lookup

B.

Services ALGs

C.

Screens

D.

Security Policy

Full Access
Question # 11

Which two protocols are supported for Sky ATP advanced anti-malware scanning? (Choose two.)

A.

POP3

B.

MAPI

C.

IMAP

D.

SMTP

Full Access
Question # 12

Click the Exhibit button.

Referring to the exhibit, you want to deploy Sky ATP with Policy Enforcer to block infected hosts at the access layer.

To complete this task, where should you configure the default gateway for the User-1 device?

A.

the irb interface on QFX-2

B.

the irb interface on QFX-1

C.

the interface of QFX-1 that connects to User-1

D.

the interface on SRX-1 that connects to QFX-2

Full Access
Question # 13

Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)

A.

Sky ATP

B.

UTM

C.

JATP

D.

IPS

Full Access