New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

JN0-231 Security-Associate (JNCIA-SEC) Questions and Answers

Questions 4

Click the Exhibit button.

Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)

Options:

A.

UDP traffic matched by the deny-all policy will be silently dropped.

B.

TCP traffic matched by the reject-all policy will have a TCP RST sent.

C.

TCP traffic matched from the zone trust is allowed by the permit-all policy.

D.

UDP traffic matched by the reject-all policy will be silently dropped.

Buy Now
Questions 5

What information does the show chassis routing-engine command provide?

Options:

A.

chassis serial number

B.

resource utilization

C.

system version

D.

routing tables

Buy Now
Questions 6

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

Options:

A.

integrated user firewall

B.

screens

C.

802.1X

D.

Juniper ATP

Buy Now
Questions 7

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

Options:

A.

traffic selector

B.

perfect forward secrecy

C.

st0 interfaces

D.

proxy ID

Buy Now
Questions 8

When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)

Options:

A.

MPLS

B.

UTM

C.

CoS

D.

IDP

Buy Now
Questions 9

Which two statements are correct about IKE security associations? (Choose two.)

Options:

A.

IKE security associations are established during IKE Phase 1 negotiations.

B.

IKE security associations are unidirectional.

C.

IKE security associations are established during IKE Phase 2 negotiations.

D.

IKE security associations are bidirectional.

Buy Now
Questions 10

Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.

Which Juniper ATP feature should you configure to accomplish this task?

Options:

A.

IPsec

B.

static NAT

C.

allowlists

D.

C&C feeds

Buy Now
Questions 11

You want to provide remote access to an internal development environment for 10 remote developers.

Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)

Options:

A.

an additional license for an SRX Series device

B.

Juniper Secure Connect client software

C.

an SRX Series device with an SPC3 services card

D.

Marvis virtual network assistant

Buy Now
Questions 12

SRX Series devices have a maximum of how many rollback configurations?

Options:

A.

40

B.

60

C.

50

D.

10

Buy Now
Questions 13

Which two statements are correct about the default behavior on SRX Series devices? (Choose two.)

Options:

A.

The SRX Series device is in flow mode.

B.

The SRX Series device supports stateless firewalls filters.

C.

The SRX Series device is in packet mode.

D.

The SRX Series device does not support stateless firewall filters.

Buy Now
Questions 14

Which three Web filtering deployment actions are supported by Junos? (Choose three.)

Options:

A.

Use IPS.

B.

Use local lists.

C.

Use remote lists.

D.

Use Websense Redirect.

E.

Use Juniper Enhanced Web Filtering.

Buy Now
Questions 15

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.

Which NAT type must be used to complete this project?

Options:

A.

source NAT

B.

destination NAT

C.

static NAT

D.

hairpin NAT

Buy Now
Questions 16

Which two IKE Phase 1 configuration options must match on both peers to successfully establish a tunnel? (Choose two.)

Options:

A.

VPN name

B.

gateway interfaces

C.

IKE mode

D.

Diffie-Hellman group

Buy Now
Questions 17

Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?

Options:

A.

firewall filters

B.

UTM

C.

Juniper ATP Cloud

D.

IPS

Buy Now
Questions 18

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

Options:

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Buy Now
Questions 19

Which two criteria should a zone-based security policy include? (Choose two.)

Options:

A.

a source port

B.

a destination port

C.

zone context

D.

an action

Buy Now
Questions 20

What is an IP addressing requirement for an IPsec VPN using main mode?

Options:

A.

One peer must have dynamic IP addressing.

B.

One peer must have static IP addressing.

C.

Both peers must have dynamic IP addresses.

D.

Both peers must have static IP addressing.

Buy Now
Questions 21

Which two addresses are valid address book entries? (Choose two.)

Options:

A.

173.145.5.21/255.255.255.0

B.

153.146.0.145/255.255.0.255

C.

203.150.108.10/24

D.

191.168.203.0/24

Buy Now
Questions 22

Which statement about NAT is correct?

Options:

A.

Destination NAT takes precedence over static NAT.

B.

Source NAT is processed before security policy lookup.

C.

Static NAT is processed after forwarding lookup.

D.

Static NAT takes precedence over destination NAT.

Buy Now
Questions 23

Which two statements are correct about the integrated user firewall feature?(Choose two.)

Options:

A.

It maps IP addresses to individual users.

B.

It supports IPv4 addresses.

C.

It allows tracking of non-Windows Active Directory users.

D.

It uses the LDAP protocol.

Buy Now
Questions 24

Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)

Options:

A.

SHA-1

B.

SHAKE128

C.

MD5

D.

RIPEMD-256

Buy Now
Questions 25

What are two valid address books? (Choose two.)

Options:

A.

66.129.239.128/25

B.

66.129.239.154/24

C.

66.129.239.0/24

D.

66.129.239.50/25

Buy Now
Questions 26

Click the Exhibit button.

Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)

Options:

A.

The DMZ routing-instance is the source.

B.

The 10.10.102.10 IP address is the source.

C.

The 10.10.102.10 IP address is the destination.

D.

The DMZ routing-instance is the destination.

Buy Now
Questions 27

What are three Junos UTM features? (Choose three.)

Options:

A.

screens

B.

antivirus

C.

Web filtering

D.

IDP/IPS

E.

content filtering

Buy Now
Questions 28

Which statement is correct about Web filtering?

Options:

A.

The Juniper Enhanced Web Filtering solution requires a locally managed server.

B.

The decision to permit or deny is based on the body content of an HTTP packet.

C.

The decision to permit or deny is based on the category to which a URL belongs.

D.

The client can receive an e-mail notification when traffic is blocked.

Buy Now
Questions 29

Which two components are configured for host inbound traffic? (Choose two.)

Options:

A.

zone

B.

logical interface

C.

physical interface

D.

routing instance

Buy Now
Questions 30

Which two statements are correct about IPsec security associations? (Choose two.)

Options:

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Buy Now
Questions 31

Which two features are included with UTM on an SRX Series device? (Choose two.)

Options:

A.

antivirus

B.

NAT

C.

IDP

D.

content filtering

Buy Now
Exam Code: JN0-231
Exam Name: Security-Associate (JNCIA-SEC)
Last Update: Dec 26, 2024
Questions: 105
JN0-231 pdf

JN0-231 PDF

$25.5  $84.99
JN0-231 Engine

JN0-231 Testing Engine

$30  $99.99
JN0-231 PDF + Engine

JN0-231 PDF + Testing Engine

$40.5  $134.99