Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

JN0-637 Exam Dumps - Security, Professional (JNCIP-SEC)

Question # 4

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

It works with third-party switches.

B.

It provides endpoint protection by running a Juniper ATP Cloud agent on the servers.

C.

It provides endpoint protection by running a Juniper ATP Cloud agent on EX Series devices.

D.

It works with SRX Series devices.

Full Access
Question # 5

Exhibit:

You created a Unified security policy called test on the network edge srx series firewall.

According to the firewall, this new security policy is not passing traffic.

Which two statements are correct in this scenario? (Choose two.)

A.

The test policy should be the last policy.

B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

C.

The source address cannot be any when a dynamic application is configured.

D.

The drop-http policy is a terminating rule and will drop the traffic.

Full Access
Question # 6

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

C.

One security profile can only be applied to one logical system.

D.

One security profile can be applied to multiple logical systems.

Full Access
Question # 7

Which two statements are correct about advanced policy-based routing?

A.

It can use the application system cache to route traffic.

B.

The associated routing instance should be configured as a virtual router instance.

C.

It cannot use the application system cache to route traffic.

D.

The associated routing instance should be configured as a forwarding instance.

Full Access
Question # 8

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

Infected hosts are tracked by their IP address.

B.

Infected hosts are tracked by their chassis serial number.

C.

Infected hosts are tracked by their MAC address.

D.

Infected hosts are tracked by their user identity.

Full Access
Question # 9

You are deploying OSPF over IPsec with an SRX Series device and third-party device using GRE.

Which two statements are correct? (Choose two.)

A.

The GRE interface should use lo0 as endpoints.

B.

The OSPF protocol must be enabled under the VPN zone.

C.

Overlapping addresses are allowed between remote networks.

D.

The GRE interface must be configured under the OSPF protocol.

Full Access
Question # 10

Exhibit:

Referring to the exhibit, which statement is true?

A.

SRG1 is configured in hybrid mode.

B.

The ICL is encrypted.

C.

If SRG1 moves to peer 2, peer 1 will drop packets sent to the SRG1 interfaces.

D.

If SRG1 moves to peer 2, peer 1 will forward packets sent to the SRG1 interfaces.

Full Access
Question # 11

Which two statements are true regarding NAT64? (Choose two.)

A.

An SRX Series device should be in packet-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv6.

C.

An SRX Series device should be in flow-based forwarding mode for IPv4.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Full Access
Question # 12

Click the Exhibit button.

Referring to the exhibit. SRX-1 and SRX-3 have to be connected using EBGP. The BGP configuration on SRX-1 and SRX-3 is verified and correct.

Which configuration on SRX-2 would establish an EBGP connection successfully between SRX-1 and SRX-3?

A.

The host-inbound-traffic statements do not allow EBGP traffic to traverse SRX-2.

B.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 79 should be configured.

C.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 169 should be configured.

D.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 179 should be configured.

Full Access
Question # 13

Exhibit:

Which two statements are correct about the output shown in the exhibit. (Choose Two)

A.

The data shown requires a traceoptions flag of basic-datapath.

B.

The data shown requires a traceoptions flag of host-traffic.

C.

The packet is dropped by the default security policy.

D.

The packet is dropped by a configured security policy.

Full Access
Question # 14

Exhibit:

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

A.

DS-Lite

B.

NAT444

C.

NAT46

D.

full cone NAT

Full Access
Question # 15

In a multinode HA environment, which service must be configured to synchronize between nodes?

A.

Advanced policy-based routing

B.

PKI certificates

C.

IPsec VPN

D.

IDP

Full Access
Question # 16

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Full Access
Question # 17

You want to create a connection for communication between tenant systems without using physical revenue ports on the SRX Series device.

What are two ways to accomplish this task? (Choose two.)

A.

Use an external router.

B.

Use an interconnect VPLS switch.

C.

Use a secure wire.

D.

Use a point-to-point logical tunnel.

Full Access
Question # 18

You are using ADVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

Which two statements are true in this scenario? (Choose two.)

A.

ADVPN creates a full-mesh topology.

B.

IBGP routing is required.

C.

OSPF routing is required.

D.

Certificate-based authentication is required.

Full Access
Question # 19

You need to set up source NAT so that external hosts can initiate connections to an internal device, but only if a connection to the device was first initiated by the internal device.

Which type of NAT solution provides this functionality?

A.

Address persistence

B.

Persistent NAT with any remote host

C.

Persistent NAT with target host

D.

Static NAT

Full Access
Question # 20

What are three requirements to run OSPF over GRE over IPsec? (Choose Three)

A.

The GRE interface must be configured in OSPF Area 0.

B.

The OSPF interface must be placed in a zone and must have GRE configured

C.

Overlapping addresses should exist between remote networks.

D.

The GRE interface must be placed in a zone and must have OSPF configured in is host

E.

Overlapping addresses should not exist between remote networks.

Full Access
Question # 21

Exhibit:

The Ipsec VPN does not establish when the peer initiates, but it does establish when the SRX

series device initiates. Referring to the exhibit, what will solve this problem?

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

B.

The screen configuration on the untrust zone needs to be modified.

C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

D.

Application tracking on the untrust zone needs to be removed.

Full Access
Question # 22

Exhibit:

You are configuring NAT64 on your SRX Series device. You have committed the configuration shown in the exhibit. Unfortunately, the communication with the 10.10.201.10 server is not working. You have verified that the interfaces, security zones, and security policies are all correctly configured.

In this scenario, which action will solve this issue?

A.

Configure source NAT to translate return traffic from IPv4 address to the IPv6 address of your source device.

B.

Configure proxy-ARP on the external IPv4 interface for the 10.10.201.10/32 address.

C.

Configure proxy-NDP on the IPv6 interface for the 2001:db8::1/128 address.

D.

Configure destination NAT to translate return traffic from the IPv4 address to the IPv6 address of your source device.

Full Access
Question # 23

Which encapsulation type must be configured on the lt-0/0/0 logical units for an interconnect

logical systems VPLS switch?

A.

encapsulation ethernet-bridge

B.

encapsulation ethernet

C.

encapsulation ethernet-vpls

D.

encapsulation vlan-vpls

Full Access
Question # 24

Which two statements are true regarding NAT64? (Choose two.)

A.

An SRX Series device should be in flow-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv4.

C.

An SRX Series device should be in packet-based forwarding mode for IPv6.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Full Access
Question # 25

You are asked to set up advanced policy-based routing.

Which type of routing instance is designed to support this scenario?

A.

forwarding

B.

virtual switch

C.

virtual router

D.

non-forwarding

Full Access
Question # 26

You are configuring advanced policy-based routing. You have created a static route with next

hop of an interface in your inet.0 routing table

Referring to the exhibit, what should be changed to solve this issue?

A.

You should change the routing instance type to virtual-router.

B.

You should move the static route configuration to the main routing instance.

C.

You should move the inet. o table before the routing instance table in your rib-groups configuration.

D.

You should delete the interface-routes configuration under the routing-options hierarchy.

Full Access
Question # 27

Exhibit:

You are troubleshooting a new IPsec VPN that is configured between your corporate office and the RemoteSite1 SRX Series device. The VPN is not currently establishing. The RemoteSite1 device is being assigned an IP address on its gateway interface using DHCP.

Which action will solve this problem?

A.

On the RemoteSite1 device, change the IKE gateway external interface to st0.0.

B.

On both devices, change the IKE version to use version 2 only.

C.

On both devices, change the IKE policy proposal set to basic.

D.

On both devices, change the IKE policy mode to aggressive.

Full Access
Question # 28

Exhibit:

You have configured a CoS-based VPN that is not functioning correctly.

Referring to the exhibit, which action will solve the problem?

A.

You must delete one forwarding class.

B.

You must change the loss priorities of the forwarding classes to low.

C.

You must use inet precedence instead of DSCP.

D.

You must change the code point for the DB-data forwarding class to 10000.

Full Access
Question # 29

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

This device is the backup node for SRG1.

B.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are not active and will not respond to ARP requests to the virtual IP MAC address.

C.

This device is the active node for SRG1.

D.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are active and will respond to ARP requests to the virtual IP MAC address.

Full Access
Question # 30

What are three core components for enabling advanced policy-based routing? (Choose three.)

A.

Filter-based forwarding

B.

Routing options

C.

Routing instance

D.

APBR profile

E.

Policies

Full Access
Question # 31

You have deployed automated threat mitigation using Security Director with Policy Enforcer, Juniper ATP Cloud, SRX Series devices, Forescout, and third-party switches.

In this scenario, which device is responsible for communicating directly to the third-party switches when infected hosts need to be blocked?

A.

Forescout

B.

Policy Enforcer

C.

Juniper ATP Cloud

D.

SRX Series device

Full Access
Question # 32

The exhibit shows part of the flow session logs.

Which two statements are true in this scenario? (Choose two.)

A.

The existing session is found in the table, and the fast path process begins.

B.

This packet arrives on interface ge-0/0/4.0.

C.

Junos captures a TCP packet from source address 172.20.101.10 destined to 10.0.1.129.

D.

Destination NAT occurs.

Full Access
Question # 33

Referring to the exhibit, which two statements are true ?

A.

Every VPN packet that the SRX receives from the VPN peer is outside the ESP sequence window

B.

The SRX is sending traffic into the tunnel and out toward the VPN peer.

C.

The SRX is not sending any packets to the VPN peer.

D.

The SRX is not receiving any packets from the VPN peer.

Full Access
Question # 34

Referring to the exhibit,

which three statements about the multinode HA environment are true? (Choose three.)

A.

Two services redundancy groups are available.

B.

IP monitoring has failed for the services redundancy group.

C.

Node 1 will host services redundancy group 1 unless it is unavailable.

D.

Session state is synchronized on both nodes.

E.

Node 2 will process transit traffic that it receives for services redundancy group 1.

Full Access