Juniper JN0-333 - Security, Specialist (JNCIS-SEC) Exam
Page: 2 / 15
Total 75 questions
Question #6 (Topic: Topic 1)
Click the Exhibit button.
[Juniper-JN0-333-1.0/xmlfile-5_1.png]
Referring to the exhibit, what will happen if client 172.16.128.50 tries to connect to destination 192.168.150.111 using HTTP?
[Juniper-JN0-333-1.0/xmlfile-5_1.png]
Referring to the exhibit, what will happen if client 172.16.128.50 tries to connect to destination 192.168.150.111 using HTTP?
A. The client will be denied by policy p2.
B. The client will be denied by policy p1.
C. The client will be permitted by policy p2.
D. The client will be permitted by policy p1.
Answer: C
Question #7 (Topic: Topic 1)
Click the Exhibit button.
[Juniper-JN0-333-1.0/xmlfile-7_1.png]
Which feature is enabled with destination NAT as shown in the exhibit?
[Juniper-JN0-333-1.0/xmlfile-7_1.png]
Which feature is enabled with destination NAT as shown in the exhibit?
A. NAT overload
B. block allocation
C. port translation
D. NAT hairpinning
Answer: D
Question #8 (Topic: Topic 1)
Which two statements about security policy actions are true? (Choose two.)
A. The log action implies an accept action.
B. The log action requires an additional terminating action.
C. The count action implies an accept action.
D. The count action requires an additional terminating action.
Answer: BC
Question #9 (Topic: Topic 1)
Which two statements are true about global security policies? (Choose two.)
A. Global security policies are evaluated before regular security policies.
B. Global security policies can be configured to match addresses across multiple zones.
C. Global security policies can match traffic regardless of security zones.
D. Global security policies do not support IPv6 traffic.
Answer: BC
Question #10 (Topic: Topic 1)
Which statement is true about functional zones?
A. Functional zones are a collection of regulated transit network segments.
B. Functional zones provide a means of distinguishing groups of hosts and their resources from one another.
C. Functional zones are used for management.
D. Functional zones are the building blocks for security policies.
Answer: C