Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > JNCIP-SEC > JN0-636

JN0-636 Security Professional (JNCIP-SEC) Question and Answers

Question # 4

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

A.

8080

B.

443

C.

80

D.

22

Full Access
Question # 5

Which statement is true about persistent NAT types?

A.

The target-host-port parameter cannot be used with IPv4 addresses in NAT46.

B.

The target-host parameter cannot be used with IPv6 addressee in NAT64.

C.

The target-host parameter cannot be used with IPv4 addresses in NAT46

D.

The target-host-port parameter cannot be used with IPv6 addresses in NAT64

Full Access
Question # 6

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Full Access
Question # 7

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

A.

WELF

B.

JSON

C.

CEF

D.

binay

Full Access
Question # 8

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Full Access
Question # 9

You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)

A.

Enroll the devices with Juniper ATP Appliance.

B.

Enroll the devices with Juniper ATP Cloud.

C.

Enable a third-party Tor feed.

D.

Create a custom feed containing all current known MAC addresses.

Full Access
Question # 10

You are asked to deploy filter-based forwarding on your SRX Series device for incoming traffic sourced from the 10.10 100 0/24 network in this scenario, which three statements are correct? (Choose three.)

A.

You must create a forwarding-type routing instance.

B.

You must create and apply a firewall filter that matches on the source address 10.10.100.0/24 and then sends this traffic to your routing

C.

You must create and apply a firewall filter that matches on the destination address 10 10.100.0/24 and then sends this traffic to your routing instance.

D.

You must create a RIB group that adds interface routes to your routing instance.

E.

You must create a VRF-type routing instance.

Full Access
Question # 11

Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?

A.

Juniper ATP Cloud

B.

Juniper Secure Analytics

C.

Juniper ATP Appliance

D.

Juniper Security Director

Full Access
Question # 12

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Full Access
Question # 13

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Full Access
Question # 14

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Full Access
Question # 15

Exhibit

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

A.

IBGP

B.

OSPF

C.

IPsec

D.

DHCP

E.

NTP

Full Access
Question # 16

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Full Access
Question # 17

Exhibit

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

Full Access
Question # 18

Exhibit

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

A.

Add multipoint to the st0.0 interface configuration on the branch1 device.

B.

Change the IKE proposal-set to compatible on the branch1 and corporate devices.

C.

Change the local identity to inet advpn on the branch1 device.

D.

Change the IKE mode to aggressive on the branch1 and corporate devices.

Full Access
Question # 19

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

You want traffic to avoid the flow daemon for administrative task.

In this scenario which two stateless service are available with selective stateless packet based service. (Choose Two)

A.

Layer 2 switching

B.

IPv4 routing

C.

IPsec

D.

IPv6 routing

Full Access
Question # 21

your company wants to take your juniper ATP appliance into private mode. You must give them a list

of impacted features for this request.

Which two features are impacted in this scenario? (Choose two)

A.

False Positive Reporting

B.

Threat Progression Monitoring

C.

GSS Telemetry

D.

Cyber Kill Chain mapping

Full Access
Question # 22

Exhibit

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

Full Access
Question # 23

You are required to secure a network against malware. You must ensure that in the event that a

compromised host is identified within the network. In this scenario after a threat has been

identified, which two components are responsible for enforcing MAC-level infected host ?

A.

SRX Series device

B.

Juniper ATP Appliance

C.

Policy Enforcer

D.

EX Series device

Full Access
Question # 24

Exhibit

Which statement is true about the output shown in the exhibit?

A.

The SRX Series device is configured with default security forwarding options.

B.

The SRX Series device is configured with packet-based IPv6 forwarding options.

C.

The SRX Series device is configured with flow-based IPv6 forwarding options.

D.

The SRX Series device is configured to disable IPv6 packet forwarding.

Full Access
Question # 25

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Full Access
Question # 26

Click the Exhibit button.

When attempting to enroll an SRX Series device to JATP, you receive the error shown in the exhibit. What is the cause of the error?

A.

The fxp0 IP address is not routable

B.

The SRX Series device certificate does not match the JATP certificate

C.

The SRX Series device does not have an IP address assigned to the interface that accesses JATP

D.

A firewall is blocking HTTPS on fxp0

Full Access
Question # 27

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

Full Access
Question # 28

Which two additional configuration actions are necessary for the third-party feed shown in the exhibit to work properly? (Choose two.)

A.

You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.

B.

You must create a dynamic address entry with the C&C category and the cc_offic365 value.

C.

You must apply the dynamic address entry in a security policy.

D.

You must apply the dynamic address entry in a security intelligence policy.

Full Access
Question # 29

What are two important function of the Juniper Networks ATP appliance solution? (Choose two.).

A.

Statistics

B.

Analysis

C.

Detection

D.

Filtration

Full Access
Question # 30

Exhibit

You are not able to ping the default gateway of 192.168 100 1 (or your network that is located on your SRX Series firewall.

Referring to the exhibit, which two commands would correct the configuration of your SRX Series device? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Full Access
Question # 32

You want to enable inter-tenant communica􀆟on with tenant system.

In this Scenario, Which two solutions will accomplish this task?

A.

interconnect EVPN switch

B.

interconnect VPLS switch

C.

external router

D.

logical tunnel interface

Full Access
Question # 33

Refer to the exhibit,

which two potential violations will generate alarm ? (Choose Two)

A.

the number of policy violations by a source network identifier

B.

the ratio of policy violation traffic compared to accepted traffic.

C.

the number of policy violation by a destination TCP port

D.

the number of policy violation to an application within a specified period

Full Access
Question # 34

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Full Access