You are on page 1of 8

Juniper 634 (78%)

Question-1 You Are Using The Intergrated User Firewall Feature On An Srx
Series Device.

A. Ip address
B. Username
C. MAC address
D. Password
E. Group mapping

Ans. A ,b,e

Q.2 to which three utm components would the custom- objects parameter
apply ?

A. Sky Atp
B. Antispam
C. Antivirus
D. Web Filtering
E. Content filtering

Ans. B , E

Q.3 You have implemented APBR on your SRX series device and
verifying that your changes are working properly. You notice that
when you start the application for the first time, it done not follow
the expected path.

A. The advanced policy-based routing is applied to the ingress zone


and must be moved to the egress zone.
B. The application system cache already has an entry for this
application
C. The application system cache does not have an entry for the first
session
D. The application system catch has been disabled

Ans C,D

Q.4 after downloading the new ips attack database , the installation
of the new database fails.

A. The new attack database was revoked between the time it was
downloaded andinstalled
B. The new attack database no longer contained an attack entry
that was in use.
C. The attack database was to large for the device on which it was
being installed .
D. Some of the new attack entries were already in use and had to
be deactived before installation

Ans B

Q.5 which two statement about enabling MACsec using static CAK
security mode keys are true?

A. SAK secures the data plance traffic


B. CAK secures the control plance traffic
C. SAK secures the data control traffic
D. CAK secures the data plance traffic

Ans. A,B

Q.6 what is a function of UTM?

A. AppFW
B. IPSec
C. Content filtering
D. Bridge mode

Ans. A

Q.7 Referring to the Exhibit. A user with ip address 10.1.1.85 generates


a request that triggers the HTTP EXT:DOT-LINK IDP singnature that is a
member that is a member of the “HTTP –ALL” predefined attack group?

A. No action will be taken the attack information will be loged


B. A differentiated service code point value of 8 will be applied.
C. The session will be closed and reset sent the client and server .
D. The session will be dropped with no reset sent to the client or
E. Server.

Ans. A

Q.8 Referring to the Exhibit. Which two statement are true.?

A. The device cannot pass layer 2 and layer 3 traffic at the same time
B. You san secure intra VLAN traffic with a security policy on this
device
C. The device can pass layer 2 and layer3 traffic at the same time
D. You can secure inter – VLAN traffic with a security policy on this
device.

Q.8 you are creating an IPS policy with multiple rules . you want traffic
that matches rule 5 to silently be dropped . along with any future
packets that match the appropriate attributes of the incoming traffic .

In this scenario which ip –action parameter should you use


A. Ip-block
B. Log-create
C. Timeout
D. Ip-close

Ans ,A

Q.10 which statement explains the current state value of the commend
output shown in the exhibit.

A. A valid response was received from a domain PC probe , and the


user programmed in the PFE.

B. The user-to-address mapping was successfully read from the domain


controller event long , and an entry was added to the authentication
table which currently resides on the routing engine.

C. A probe event generated an entry in the authentication table , but


no probe response has been received from the domain
PC .

D. An invalid response was received from a domain PC probe , and the


user is an invalid domain user .

Ans -: A

Q 11-: A customer has recently deployed a next –generation firewall,


sandboxing software cloud access security brokers (CASB), and
endpoint protection

In this scenario , which tool would provide the customer with additional
attack prevention.
A. Junos space cross provisioning platform
B. Security director policy enforcer
C. Contrail
D. Network director inventory manager

Ans B

Q. 12 -: Using content filtering on an SRX series , which three of HTTP


content are able to be blocked .

A. java apples

B. active X

C. flash

D. PDF files

E. ZIP files

Ans -: A,B,E

Q-:13 The software –defined secure network policy enforcer contains


which two components

A. Sky ATP
B. Policy controller
C. SRX series device
D. Feed connector

Ans -: B,D
Q-: 14 you have been notified by your colocation provider that your
infrastructure racks will no longer be adjacent to each other .

In this scenario, which technology would you use to secure all leyer2
ans leyer3 and traffic between racks.

A. GRE
B. Ip sec
C. 802.1BR
D. MACsec

Ans D

Q 15 referring to the exhibit , how many Apptrack log will be generated


for an HTTP session lagting 12 minutes .

A. 2

B. 1

C. 4

D. 3

Ans – B

Q. 16 …nili reviewing the log and reporting portion of security director ,


you find that multiple object reference the same adders . you want to
use a standardized name for all of the object …….this scenario how
would you create a standardized object name without searching the
entire policy.

A. Replace the duplicate objects.

B. Replace the duplicate objects.


C. Replace the duplicate objects.

D. Merge the duplicate objects.

Ans , D

Q . 17 You are trying to implement secure wire on your SRX Series


device . However , you are receiving the commit error shown in the
exhibit

What must you do to soive the problem

A. Put the ge-0/0/4 and ge -0/0/5 interfaces in separate secure


wires.
B. Change the ethernet switching mode from access to trunk for the
ge-0/0/4 and ge -0/0/5 interfaces.
C. Add the correct logical units to the interfaces in the secure wire.
D. Add the ge -0/0/4 and ge -0/0/5 Intefraces to the SV. VLAS.

Ans C

Q 18 which junos security feature is used for signature –based attack


prevention.

A. RADIUS

B. AppQoS

C. IPC

D. PIM

Ans , C.

Q 19. App Secure feature identifies applications that are present in


traffic
A. AppId
B. App Track
C. App FW
D. App QoS

Ans, A

Q. 20

You might also like