Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following JN0-635 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is JN0-636

JN0-635 Exam Dumps - Security Professional (JNCIP-SEC)

Question # 4

Which Junos security feature is used for signature-based attack prevention?

A.

RADIUS

B.

AppQoS

C.

IPS

D.

PIM

Full Access
Question # 5

Click the Exhibit button.

Referring to the exhibit, which statement is true?

A.

ARP security is securing data across the control interface

B.

IPsec is securing data across the control interface

C.

SSH is securing data across the control interface

D.

MACsec is securing data across the control interface

Full Access
Question # 6

You must troubleshoot ongoing problems with IPsec tunnels and security policy processing. Your network consists of SRX340s and SRX5600s.

In this scenario, which two statements are true? (Choose two.)

A.

IPsec logs are written to the kmd log file by default

B.

IKE logs are written to the messages log file by default

C.

You must enable data plane logging on the SRX340 devices to generate security policy logs

D.

You must enable data plane logging on the SRX5600 devices to generate security policy logs

Full Access
Question # 7

Click the Exhibit button.

Referring to the exhibit, which two statements are true? (Choose two.)

A.

You can secure intra-VLAN traffic with a security policy on this device

B.

You can secure inter-VLAN traffic with a security policy on this device

C.

The device can pass Layer 2 and Layer 3 traffic at the same time

D.

The device cannot pass Layer 2 and Layer 3 traffic at the same time

Full Access
Question # 8

Which feature of Sky ATP is deployed with Policy Enforcer?

A.

zero-day threat mitigation

B.

software image snapshot support

C.

device inventory management

D.

service redundancy daemon configuration support

Full Access
Question # 9

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Full Access
Question # 10

You are asked to look at a configuration that is designed to take all traffic with a specific source ip address and forward the

traffic to a traffic analysis server for further evaluation. The configuration is no longer working as intended.

Referring to the exhibit which change must be made to correct the configuration?

A.

Apply the filter as in input filter on interface xe-0/2/1.0

B.

Apply the filter as in input filter on interface xe-0/0/1.0

C.

Create a routing instance named default

D.

Apply the filter as in output filter on interface xe-0/1/0.0

Full Access
Question # 11

You configured a security policy permitting traffic from the trust zone to the DMZ zone, inserted the new policy

at the top of the list, and successfully committed it to the SRX Series device. Upon monitoring, you notice that the hit count does not increase on the newly configured policy.

In this scenario, which two commands would help you to identify the problem? (Choose two.)

A.

user@srx> show security zones trust detail

B.

user@srx> show security shadow-policies from zone trust to zone DMZ

C.

user@srx> show security match-policies from-zone trust to-zone DMZ source-ip 192.168.10.100/32

destination-ip 10.10.10.80/32 protocol tcp source-port 5806 destination-port 443

D.

user@srx> show security match-policies from-zone trust to-zone DMZ source-ip 192.168.10.100/32

destination-ip 10.10.10.80/32 protocol tcp source-port 5806 destination-port

443 result-count 10

Full Access
Question # 12

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Full Access
Question # 13

Click the Exhibit button.

You have configured tenant systems on your SRX Series device.

Referring to the exhibit, which two actions should you take to facilitate inter-TSYS communication? (Choose two.)

A.

Place the logical tunnel interfaces in a virtual router routing instance in the interconnect switch

B.

Place the logical tunnel interfaces in a VPLS routing instance in the interconnect switch

C.

Connect each TSYS with the interconnect switch by configuring INET configured logical tunnel interfaces in the interconnect switch

D.

Connect each TSYS with the interconnect switch by configuring Ethernet VPLS configured logical tunnel interfaces in the interconnect switch

Full Access