Juniper JN0-335 - Security, Specialist (JNCIS-SEC) Exam
Page: 2 / 21
Total 103 questions
Question #6 (Topic: Exam A)
You have deployed an SRX300 Series device and determined that files have stopped being scanned.
In this scenario, what is a reason for this problem?
In this scenario, what is a reason for this problem?
A. The software license is a free model and only scans executable type files.
B. The infected host communicated with a command-and-control server, but it did not download malware.
C. The file is too small to have a virus.
D. You have exceeded the maximum files submission for your SRX platform size.
Answer: D
Question #7 (Topic: Exam A)
Which three statements about SRX Series device chassis clusters are true? (Choose three.)
A. Chassis cluster control links must be configured using RFC 1918 IP addresses.
B. Chassis cluster member devices synchronize configuration using the control link.
C. A control link failure causes the secondary cluster node to be disabled.
D. Recovery from a control link failure requires that the secondary member device be rebooted.
E. Heartbeat messages verify that the chassis cluster control link is working.
Answer: BCE
Question #8 (Topic: Exam A)
Which two statements are correct about security policy changes when using the policy rematch feature? (Choose two.)
A. When a policy change includes changing the policy's action from permit to deny, all existing sessions are maintained.
B. When a policy change includes changing the policy's source or destination address match condition, all existing sessions are dropped.
C. When a policy change includes changing the policy's action from permit to deny, all existing sessions are dropped.
D. When a policy change includes changing the policy's source or destination address match condition, all existing sessions are reevaluated.
Answer: CD
Question #9 (Topic: Exam A)
You are asked to block malicious applications regardless of the port number being used.
In this scenario, which two application security features should be used? (Choose two.)
In this scenario, which two application security features should be used? (Choose two.)
A. AppFW
B. AppQoE
C. APPID
D. AppTrack
Answer: AC
Question #10 (Topic: Exam A)
A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the client's IP address be automatically added in this situation?
Which feed will the client's IP address be automatically added in this situation?
A. the command-and-control cloud feed
B. the allowlist and blocklist feed
C. the custom cloud feed
D. the infected host cloud feed
Answer: D