Juniper JN0-336 - Security, Specialist (JNCIS-SEC) Exam
Page: 2 / 13
Total 64 questions
Question #6 (Topic: Exam A)
An administrator decides to designate a node as the primary node for the chassis cluster.
Which statement is correct in this scenario?
Which statement is correct in this scenario?
A. Configure the burnt-in-address (BIA) to the highest value to bring the node as the primary node.
B. The node with the highest priority will become a primary node.
C. The node with the lowest priority will become a primary node.
D. Nodes with a priority of one are ineligible to participate in the election process.
Answer: B
Question #7 (Topic: Exam A)
Which two statements are correct about client-protection Secure Socket Layer (SSL) proxy configurations? (Choose two.)
A. Server certificate is required.
B. Root certificate authority (CA) configuration is required.
C. Root certificate authority (CA) configuration is not required.
D. Server certificate is not required.
Answer: AB
Question #8 (Topic: Exam A)
You are asked to ensure that traffic that matches an IDP policy is not impacted until administrators have a chance to evaluate it.
In this scenario, which IP action should be configured for the policy?
In this scenario, which IP action should be configured for the policy?
A. ip-block
B. ip-notify
C. ip-connection-rate-limit
D. ip-close
Answer: B
Question #9 (Topic: Exam A)

Your manager asks you to update your SRX Series device’s IDP security package. You perform the required steps; however, when you attempt to install the package, you receive an error.
Referring to the exhibit, which two statements are correct about this error? (Choose two.)
A. IDP stops inspecting traffic.
B. The IDP license has expired.
C. IDP continues to inspect traffic only using the installed signatures.
D. The IDP license is missing (not installed).
Answer: CD
Question #10 (Topic: Exam A)
You are asked to set up SSL proxy in SRX Series devices. An SSL proxy profile is already defined for you.
Which two steps are required to complete the setup? (Choose two.)
Which two steps are required to complete the setup? (Choose two.)
A. Enable host-inbound-traffic HTTPS in the security zone in which SSL proxy is referenced.
B. Reference the SSL proxy profile in a security zone.
C. Reference the SSL proxy profile in a security policy.
D. Enable any Layer 7 services in the security policy in which SSL proxy is referenced.
Answer: BC