New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-335 Exam Dumps - Security, Specialist (JNCIS-SEC)

Go to page:
Question # 9

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

A.

AppTrack

B.

AppQoS

C.

AppFW

D.

APPID

Full Access
Question # 11

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.

How do you solve this problem?

A.

Load a known good, but expired. CA certificate onto the SRX Series device.

B.

Install a new SRX Series device to act as the client proxy

C.

Reboot the SRX Series device.

D.

Import the existing certificate to each client device.

Full Access
Question # 12

Regarding static attack object groups, which two statements are true? (Choose two.)

A.

Matching attack objects are automatically added to a custom group.

B.

Group membership automatically changes when Juniper updates the IPS signature database.

C.

Group membership does not automatically change when Juniper updates the IPS signature database.

D.

You must manually add matching attack objects to a custom group.

Full Access
Question # 13

Exhibit

Referring to the exhibit which statement is true?

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Full Access
Question # 14

Which statement defines the function of an Application Layer Gateway (ALG)?

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Full Access
Question # 15

Which two statements about the DNS ALG are correct? (Choose two.)

A.

The DNS ALG supports DDNS.

B.

The DNS ALG supports VPN tunnels.

C.

The DNS ALG performs DNS doctoring.

D.

The DNS ALG does not support NAT.

Full Access
Question # 16

Which two statements are true about the vSRX? (Choose two.)

A.

It does not have VMXNET3 vNIC support.

B.

It has VMXNET3 vNIC support.

C.

UNIX is the base OS.

D.

Linux is the base OS.

Full Access
Go to page: