New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-637 Exam Dumps - Security, Professional (JNCIP-SEC)

Go to page:
Question # 4

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

It works with third-party switches.

B.

It provides endpoint protection by running a Juniper ATP Cloud agent on the servers.

C.

It provides endpoint protection by running a Juniper ATP Cloud agent on EX Series devices.

D.

It works with SRX Series devices.

Full Access
Question # 5

Exhibit:

You created a Unified security policy called test on the network edge srx series firewall.

According to the firewall, this new security policy is not passing traffic.

Which two statements are correct in this scenario? (Choose two.)

A.

The test policy should be the last policy.

B.

A match exists on the test policy, but the dynamic application is waiting to be discovered

C.

The source address cannot be any when a dynamic application is configured.

D.

The drop-http policy is a terminating rule and will drop the traffic.

Full Access
Question # 6

You want to use a security profile to limit the system resources allocated to user logical systems.

In this scenario, which two statements are true? (Choose two.)

A.

If nothing is specified for a resource, a default reserved resource is set for a specific logical system.

B.

If you do not specify anything for a resource, no resource is reserved for a specific logical system, but the entire system can compete for resources up to the maximum available.

C.

One security profile can only be applied to one logical system.

D.

One security profile can be applied to multiple logical systems.

Full Access
Question # 7

Which two statements are correct about advanced policy-based routing?

A.

It can use the application system cache to route traffic.

B.

The associated routing instance should be configured as a virtual router instance.

C.

It cannot use the application system cache to route traffic.

D.

The associated routing instance should be configured as a forwarding instance.

Full Access
Question # 8

Which two statements are correct about automated threat mitigation with Security Director? (Choose two.)

A.

Infected hosts are tracked by their IP address.

B.

Infected hosts are tracked by their chassis serial number.

C.

Infected hosts are tracked by their MAC address.

D.

Infected hosts are tracked by their user identity.

Full Access
Go to page: