Professional Documents
Culture Documents
Question-1 You Are Using The Intergrated User Firewall Feature On An Srx
Series Device.
A. Ip address
B. Username
C. MAC address
D. Password
E. Group mapping
Ans. A ,b,e
Q.2 to which three utm components would the custom- objects parameter
apply ?
A. Sky Atp
B. Antispam
C. Antivirus
D. Web Filtering
E. Content filtering
Ans. B , E
Q.3 You have implemented APBR on your SRX series device and
verifying that your changes are working properly. You notice that
when you start the application for the first time, it done not follow
the expected path.
Ans C,D
Q.4 after downloading the new ips attack database , the installation
of the new database fails.
A. The new attack database was revoked between the time it was
downloaded andinstalled
B. The new attack database no longer contained an attack entry
that was in use.
C. The attack database was to large for the device on which it was
being installed .
D. Some of the new attack entries were already in use and had to
be deactived before installation
Ans B
Q.5 which two statement about enabling MACsec using static CAK
security mode keys are true?
Ans. A,B
A. AppFW
B. IPSec
C. Content filtering
D. Bridge mode
Ans. A
Ans. A
A. The device cannot pass layer 2 and layer 3 traffic at the same time
B. You san secure intra VLAN traffic with a security policy on this
device
C. The device can pass layer 2 and layer3 traffic at the same time
D. You can secure inter – VLAN traffic with a security policy on this
device.
Q.8 you are creating an IPS policy with multiple rules . you want traffic
that matches rule 5 to silently be dropped . along with any future
packets that match the appropriate attributes of the incoming traffic .
Ans ,A
Q.10 which statement explains the current state value of the commend
output shown in the exhibit.
Ans -: A
In this scenario , which tool would provide the customer with additional
attack prevention.
A. Junos space cross provisioning platform
B. Security director policy enforcer
C. Contrail
D. Network director inventory manager
Ans B
A. java apples
B. active X
C. flash
D. PDF files
E. ZIP files
Ans -: A,B,E
A. Sky ATP
B. Policy controller
C. SRX series device
D. Feed connector
Ans -: B,D
Q-: 14 you have been notified by your colocation provider that your
infrastructure racks will no longer be adjacent to each other .
In this scenario, which technology would you use to secure all leyer2
ans leyer3 and traffic between racks.
A. GRE
B. Ip sec
C. 802.1BR
D. MACsec
Ans D
A. 2
B. 1
C. 4
D. 3
Ans – B
Ans , D
Ans C
A. RADIUS
B. AppQoS
C. IPC
D. PIM
Ans , C.
Ans, A
Q. 20