Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

JN0-335 Exam Dumps - Security, Specialist (JNCIS-SEC)

Question # 4

Which two statements are true about application identification? (Choose two.)

A.

Application identification can identity nested applications that are within Layer 7.

B.

Application identification cannot identify nested applications that are within Layer 7.

C.

Application signatures are the same as IDP signatures.

D.

Application signatures are not the same as IDP signatures.

Full Access
Question # 5

Which two statements are correct about SSL proxy server protection? (Choose two.)

A.

You do not need to configure the servers to use the SSL proxy the function on the SRX Series device.

B.

You must load the server certificates on the SRX Series device.

C.

The servers must be configured to use the SSL proxy function on the SRX Series device.

D.

You must import the root CA on the servers.

Full Access
Question # 6

Exhibit

Referring to the exhibit, what do you determine about the status of the cluster.

A.

Both nodes determine that they are in a primary state.

B.

Node 1 is down

C.

Node 2 is down.

D.

There are no issues with the cluster.

Full Access
Question # 7

Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

A.

building blocks

B.

assets

C.

events

D.

tests

Full Access
Question # 8

You want to control when cluster failovers occur.

In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)

A.

hearcbeac-interval

B.

heartbeac-address

C.

hearcbeat-cos

D.

hearcbeac-chreshold

Full Access
Question # 9

Exhibit

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

You want to use IPS signatures to monitor traffic.

Which module in the AppSecure suite will help in this task?

A.

AppTrack

B.

AppQoS

C.

AppFW

D.

APPID

Full Access
Question # 11

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.

How do you solve this problem?

A.

Load a known good, but expired. CA certificate onto the SRX Series device.

B.

Install a new SRX Series device to act as the client proxy

C.

Reboot the SRX Series device.

D.

Import the existing certificate to each client device.

Full Access
Question # 12

Regarding static attack object groups, which two statements are true? (Choose two.)

A.

Matching attack objects are automatically added to a custom group.

B.

Group membership automatically changes when Juniper updates the IPS signature database.

C.

Group membership does not automatically change when Juniper updates the IPS signature database.

D.

You must manually add matching attack objects to a custom group.

Full Access
Question # 13

Exhibit

Referring to the exhibit which statement is true?

A.

SSL proxy functions will ignore the session.

B.

SSL proxy leverages post-match results.

C.

SSL proxy must wait for return traffic for the final match to occur.

D.

SSL proxy leverages pre-match result

Full Access
Question # 14

Which statement defines the function of an Application Layer Gateway (ALG)?

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Full Access
Question # 15

Which two statements about the DNS ALG are correct? (Choose two.)

A.

The DNS ALG supports DDNS.

B.

The DNS ALG supports VPN tunnels.

C.

The DNS ALG performs DNS doctoring.

D.

The DNS ALG does not support NAT.

Full Access
Question # 16

Which two statements are true about the vSRX? (Choose two.)

A.

It does not have VMXNET3 vNIC support.

B.

It has VMXNET3 vNIC support.

C.

UNIX is the base OS.

D.

Linux is the base OS.

Full Access
Question # 17

Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)

A.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are maintained

B.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are dropped.

C.

When a policy change includes changing the policy's action from permit to deny, all existing sessions are dropped.

D.

When a policy change includes changing the policy's source or destination address match condition, all existing sessions are reevaluated.

Full Access
Question # 18

You are implementing an SRX Series device at a branch office that has low bandwidth and also uses a cloud-based VoIP solution with an outbound policy that permits all traffic.

Which service would you implement at your edge device to prioritize VoIP traffic in this scenario?

A.

AppFW

B.

SIP ALG

C.

AppQoE

D.

AppQoS

Full Access
Question # 19
A.

IPS is integrated as a security service on SRX Series devices.

B.

IPS uses sandboxinQ to detect unknown attacks.

C.

IPS is a standalone platform running on dedicated hardware or as a virtual device.

D.

IPS uses protocol anomaly rules to detect unknown attacks.

Full Access
Question # 20

Exhibit

Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

A.

The session-class parameter in only used when troubleshooting.

B.

The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.

C.

Every session that enters the SRX Series device will generate an event

D.

Replacing the session-init parameter with session-lose will log unidentified flows.

Full Access
Question # 21

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.

The fab interface enables configuration synchronization.

D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Full Access
Question # 22

Which three statements about SRX Series device chassis clusters are true? (Choose three.)

A.

Chassis cluster control links must be configured using RFC 1918 IP addresses.

B.

Chassis cluster member devices synchronize configuration using the control link.

C.

A control link failure causes the secondary cluster node to be disabled.

D.

Recovery from a control link failure requires that the secondary member device be rebooted.

E.

Heartbeat messages verify that the chassis cluster control link is working.

Full Access
Question # 23

Which two statements are correct about a policy scheduler? (Choose two.)

A.

A policy scheduler can only be applied when using the policy-rematch feature.

B.

A policy scheduler can be dynamically activated based on traffic flow volumes.

C.

A policy scheduler can be defined using a daily schedule.

D.

A policy scheduler determines the time frame that a security policy is actively evaluated.

Full Access
Question # 24

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Full Access
Question # 25

Exhibit

When trying to set up a server protection SSL proxy, you receive the error shown. What are two reasons for this error? (Choose two.)

A.

The SSL proxy certificate ID is part of a blocklist.

B.

The SSL proxy certificate ID does not have the correct renegotiation option set.

C.

The SSL proxy certificate ID is for a forwarding proxy.

D.

The SSL proxy certificate ID does not exist.

Full Access
Question # 26

You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.

In this scenario, what is the correct order for rebooting the devices?

A.

Reboot the secondary device, then the primary device.

B.

Reboot only the secondary device since the primary will assign itself the correct cluster and node ID.

C.

Reboot the primary device, then the secondary device.

D.

Reboot only the primary device since the secondary will assign itself the correct cluster and node ID.

Full Access
Question # 27

Which method does the loT Security feature use to identify traffic sourced from IoT devices?

A.

The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud

B.

The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.

C.

The SRX Series device identifies loT devices using their MAC address.

D.

The SRX Series device identifies loT devices from metadata extracted from their transit traffic.

Full Access
Question # 28

Which statement regarding Juniper Identity Management Service (JIMS) domain PC probes is true?

A.

JIMS domain PC probes analyze domain controller security event logs at60-mmute intervals by default.

B.

JIMS domain PC probes are triggered if no username to IP address mapping is found in the domain security event log.

C.

JIMS domain PC probes are triggered to map usernames to group membership information.

D.

JIMS domain PC probes are initiated by an SRX Series device to verify authentication table information.

Full Access
Question # 29

You are asked to determine how much traffic a popular gaming application is generating on your network.

Which action will you perform to accomplish this task?

A.

Enable AppQoS on the proper security zones

B.

Enable APBR on the proper security zones

C.

Enable screen options on the proper security zones

D.

Enable AppTrack on the proper security zones.

Full Access