Security, Specialist (JNCIS-SEC) v1.0 (JN0-335)

Page:    1 / 7   
Total 99 questions

What information does encrypted traffic insights (ETI) use to notify SRX Series devices about known malware sites?

  • A. certificates
  • B. dynamic address groups
  • C. MAC addresses
  • D. domain names


Answer : A

Click the Exhibit button.

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.
Which two commands would add this functionality to the FindThreat policy? (Choose two.)

  • A.
  • B.
  • C.
  • D.


Answer : AD

Which two types of SSL proxy are available on SRX Series devices? (Choose two.)

  • A. Web proxy
  • B. client-protection
  • C. server-protection
  • D. DNS proxy


Answer : BC

Click the Exhibit button.

You are asked to ensure that servers running the Ubuntu OS will not be able to update automatically by blocking their access at the SRX firewall. You have configured a unified security policy named BlockUbuntu, but it is not blocking the updates to the OS.
Referring to the exhibit, which statement will block the Ubuntu OS updates?

  • A. Move the BlockUbuntu policy after the AllowWeb policy.
  • B. Configure the BlockUbuntu policy with the junos-https application parameter.
  • C. Change the default policy to permit-all.
  • D. Configure the AllowWeb policy to have a dynamic application of any.


Answer : A

Click the Exhibit button.

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172.25.11.0/24 subnet to the Internet.
You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.
Which two actions would correct the error? (Choose two.)

  • A. Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.
  • B. Execute the Junos commit full command to override the error and apply the configuration.
  • C. Create a custom application named http at the [edit applications] hierarchy.
  • D. Modify the security policy to use the built-in junos-http application.


Answer : CD

Which two statements are correct about AppTrack? (Choose two.)

  • A. AppTrack can be configured for any defined logical system on an SRX Series device.
  • B. AppTrack identifies and blocks traffic flows that might be malicious regardless of the ports being used.
  • C. AppTrack collects traffic flow information including byte, packet, and duration statistics.
  • D. AppTrack can only be configured in the main logical system on an SRX Series device.


Answer : AC

Click the Exhibit button.

You have implemented SSL client protection proxy. Employees are receiving the error shown in the exhibit.
How do you solve this problem?

  • A. Load a known good, but expired, CA certificate onto the SRX Series device.
  • B. Install a new SRX Series device to act as the client proxy.
  • C. Reboot the SRX Series device.
  • D. Import the existing certificate to each client device.


Answer : D

When a security policy is modified, which statement is correct about the default behavior for active sessions allowed by that policy?

  • A. The active sessions allowed by the policy will be dropped.
  • B. Only policy changes that involve modification of the action field will cause the active sessions affected by the change to be dropped.
  • C. Only policy changes that involve modification of the application will cause the active sessions affected by the change to be dropped.
  • D. The active sessions allowed by the policy will continue unchanged.


Answer : D

On an SRX Series firewall, what are two ways that Encrypted Traffic Insights assess the threat of the traffic? (Choose two.)

  • A. It decrypts the file in a sandbox.
  • B. It validates the certificates used.
  • C. It decrypts the data to validate the hash.
  • D. It reviews the timing and frequency of the connections.


Answer : BD

Click the Exhibit button.

You are validating the configuration template for device access. The commands in the exhibit have been entered to secure IP access to an SRX Series device.
Referring to the exhibit, which two statements are true? (Choose two.)

  • A. The device manager can access the device from 192.168.11.248.
  • B. The loopback interface blocks invalid traffic on its entry into the device.
  • C. The loopback interface blocks invalid traffic on its exit from the device.
  • D. The device manager can access the device from 10.253.1.2.


Answer : BD

Click the Exhibit button.

Which two statements describe the output shown in the exhibit? (Choose two.)

  • A. Redundancy group 1 experienced an operational failure.
  • B. Redundancy group 1 was administratively failed over.
  • C. Node 0 is controlling traffic for redundancy group 1.
  • D. Node 1 is controlling traffic for redundancy group 1.


Answer : BD

What are two requirements for enabling AppQoE? (Choose two.)

  • A. You need two SRX Series device endpoints.
  • B. You need two SRX Series or MX Series device endpoints.
  • C. You need an APPID feature license.
  • D. You need to configure AppQoE for reverse traffic.


Answer : BC

How does Juniper ATP Cloud protect a network from zero-day threats?

  • A. It uses a cache lookup.
  • B. It uses antivirus software.
  • C. It uses dynamic analysis.
  • D. It uses known virus signatures.


Answer : C

Click the Exhibit button.

Referring to the exhibit, what will the SRX Series device do in this configuration?

  • A. Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.
  • B. Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.
  • C. Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.
  • D. Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.


Answer : C

You want to control when cluster failovers occur.
In this scenario, which two specific parameters would you configure on an SRX Series device? (Choose two.)

  • A. heartbeat-interval
  • B. heartbeat-address
  • C. heartbeat-tos
  • D. heartbeat-threshold


Answer : AD

Page:    1 / 7   
Total 99 questions