New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-636 Exam Dumps - Security, Professional (JNCIP-SEC)

Go to page:
Question # 25

The monitor traffic interface command is being used to capture the packets destined to and the from the SRX Series device.

In this scenario, which two statements related to the feature are true? (Choose two.)

A.

This feature does not capture transit traffic.

B.

This feature captures ICMP traffic to and from the SRX Series device.

C.

This feature is supported on high-end SRX Series devices only.

D.

This feature is supported on both branch and high-end SRX Series devices.

Full Access
Question # 26

Click the Exhibit button.

When attempting to enroll an SRX Series device to JATP, you receive the error shown in the exhibit. What is the cause of the error?

A.

The fxp0 IP address is not routable

B.

The SRX Series device certificate does not match the JATP certificate

C.

The SRX Series device does not have an IP address assigned to the interface that accesses JATP

D.

A firewall is blocking HTTPS on fxp0

Full Access
Question # 27

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

A.

200l:DB8:0:f101;:2

B.

192.168.30.191

C.

192.168.30.190

D.

192.168.30.188

Full Access
Question # 28

Exhibit

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Full Access
Question # 29

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Full Access
Question # 30

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Full Access
Question # 31

Exhibit

Referring to the exhibit, which statement is true?

A.

This custom block list feed will be used before the Juniper Seclntel

B.

This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.

C.

This custom block list feed will be used instead of the Juniper Seclntel block list feed

D.

This custom block list feed will be used after the Juniper Seclntel block list feed.

Full Access
Question # 32

Exhibit:

Referring to the exhibit, which two statements are correct?

A.

All of the entries are a threat level 8

B.

All of the entries are command and control entries.

C.

All of the entries are Dshield entries

D.

All of the entries are a threat level 10.

Full Access
Go to page: