Juniper JN0-230 - Security, Associate (JNCIA-SEC) Exam

Question #6 (Topic: Topic 1)
Which method do VPNs use to prevent outside parties from viewing packets in clear text?
A. integrity B. authentication C. encryption D. NAT-T
Answer: C
Question #7 (Topic: Topic 1)
What is the correct order of processing when configuring NAT rules and security policies?
A. destination NAT > policy lookup > source NAT > static NAT B. policy lookup > source NAT > static NAT > destination NAT C. source NAT > static NAT > destination NAT > policy lookup D. static NAT > destination NAT > policy lookup > source NAT
Answer: D
Question #8 (Topic: Topic 1)
Which two statements describe IPsec VPNs? (Choose two.)
A. IPsec VPN traffic is always authenticated. B. IPsec VPNs are dedicated physical connections between two private networks. C. IPsec VPN traffic is always encrypted. D. IPsec VPNs use security measures to secure traffic over a public network between two remote sites.
Answer: AD
Question #9 (Topic: Topic 1)
Which zone is considered a functional zone?
A. junos host B. null C. trust D. management
Answer: B
Question #10 (Topic: Topic 1)
What does IPsec use to negotiate encryption algorithms?
A. AH B. TLS C. IKE D. ESP
Answer: C
Download Exam
Page: 2 / 13
Total 65 questions