Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > Associate JNCIA-SEC > JN0-232

JN0-232 Security, Associate (JNCIA-SEC) Question and Answers

Question # 4

You have created a series of security policies permitting access to a variety of services. You now want to create a policy that blocks access to all other services for all user groups.

What should you create in this scenario?

A.

global security policy

B.

Juniper ATP policy

C.

IDP policy

D.

integrated user firewall policy

Full Access
Question # 5

Which two statements about global security policies are correct? (Choose two.)

A.

The from-zone and to-zone contexts are not required for a global security policy.

B.

Global security policies require specific zone contexts.

C.

Global policies are processed before zone-based security policies.

D.

You can use both zone-based security policies and global security policies at the same time.

Full Access
Question # 6

You want to use Avira Antivirus.

Which two actions should you perform to satisfy this requirement? (Choose two.)

A.

Restart the management daemon (mgd) to load the components.

B.

Enable the Avira engine in operational mode.

C.

Reboot the SRX Series device to load the components.

D.

Enable the Avira engine in configuration mode.

Full Access
Question # 7

What is a purpose for creating multiple routing instances on an SRX Series Firewall device?

A.

to enable network monitoring through SNMP

B.

to maintain separation of routing information for security purposes

C.

to manage routing protocols and updates

D.

to simplify the configuration of network interfaces

Full Access
Question # 8

Which statement is correct about source NAT?

A.

It translates MAC addresses to private IP addresses.

B.

It translates private IP addresses to public IP addresses.

C.

It performs bidirectional IP address translation.

D.

It performs translation on ingress traffic only.

Full Access
Question # 9

Which two statements about management functional zones are correct? (Choose two.)

A.

The management functional zone is used to control the management-related traffic that is allowed to access your device.

B.

The management functional zone contains all available revenue ports until they are assigned to a user-defined security zone.

C.

The management functional zone is automatically created on the SRX Series Firewalls.

D.

The management functional zone cannot be referenced in any security policies.

Full Access
Question # 10

Content filtering supports which two of the following protocols? (Choose two.)

A.

SMTP

B.

SNMP

C.

TFTP

D.

HTTP

Full Access
Question # 11

What is the purpose of rate-limiting exception traffic in the Junos OS?

A.

to enhance the performance of the forwarding plane

B.

to simplify the configuration of network interfaces

C.

to prevent denial-of-service attacks on the Routing Engine

D.

to manage routing protocols and updates

Full Access
Question # 12

You are asked to reduce security configuration complexity on your external facing firewalls. You notice that a previous administrator included hundreds of private subnet NAT rules covering various RFC1918 addresses. You want to replace all these rules with a single rule covering all RFC1918 addresses.

Which rule would you use in this scenario?

A.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.168.0.0/16 172.16.0.0/12]

B.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.16.0.0/12 172.168.0.0/16]

C.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 172.168.0.0/16 192.0.2.0/24 203.1.113.0/24]

D.

set security nat source rule-set private-to-pub rule RFC1918 match source-address [10.0.0.0/8 192.168.0.0/16 172.16.0.0/12 192.0.2.0/24]

Full Access
Question # 13

Which two statements about destination NAT are correct? (Choose two.)

A.

Destination NAT enables hosts on a private network to access resources on the Internet.

B.

SRX Series Firewalls support interface-based destination NAT.

C.

Destination NAT enables hosts on the Internet to access resources on a private network.

D.

SRX Series Firewalls support pool-based destination NAT.

Full Access
Question # 14

Which two statements are correct about security zones? (Choose two.)

A.

An interface can exist in multiple security zones.

B.

Interfaces in the same security zone must share the same routing instance.

C.

Interfaces in the same security zone must use separate routing instances.

D.

A security zone can contain multiple interfaces.

Full Access
Question # 15

What are two ways that an SRX Series device identifies content? (Choose two.)

A.

It identifies and inspects the file extension of each file.

B.

It uses AppID.

C.

It identifies file types in HTTP, FTP, and e-mail protocols.

D.

It uses ALGs.

Full Access
Question # 16

Which two criteria would be used for matching in security policies? (Choose two.)

A.

MAC address

B.

source address

C.

interface name

D.

applications

Full Access
Question # 17

Click the Exhibit button.

Which two statements are correct about the content filter shown in the exhibit? (Choose two.)

A.

.exe files will not be allowed to be uploaded over HTTP.

B.

.exe files will not be allowed to be downloaded over HTTP.

C.

There will be a notice added to the SRX log file about the file being blocked.

D.

There will be an e-mail sent to the user about why the SRX is blocking the file.

Full Access
Question # 18

Which two statements describe what Port Address Translation (PAT) does? (Choose two.)

A.

It maps an external IP address to an internal IP address.

B.

It enables multiple external clients to initiate a connection with multiple internal devices.

C.

It enables multiple internal devices to share a single external IP address.

D.

It maps an internal IP address to an external IP address and port number.

Full Access
Question # 19

What is the purpose of a feature profile in a UTM configuration?

A.

It applies a UTM feature to a security policy.

B.

It applies a UTM feature to protocol traffic.

C.

It defines the operation of a specific UTM feature.

D.

It defines an object list.

Full Access