Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

JN0-636 Security, Professional (JNCIP-SEC) Questions and Answers

Questions 4

Exhibit

Options:

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Buy Now
Questions 5

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

Options:

A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Buy Now
Questions 6

You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud

Which command will return this information?

Options:

A.

show security dynamic—address category—name CC | match 203.0.113.5

B.

show security dynamic—address category—name Infected—Hosts | match 203.0.113.5

C.

show security dynamic-address category-name IP Filter I match 203.0.113.5

D.

show Security dynamic-address category-name JWAS | match 203.0.113.5

Buy Now
Questions 7

Exhibit

Referring to the exhibit, which three protocols will be allowed on the ge-0/0/5.0 interface? (Choose three.)

Options:

A.

IBGP

B.

OSPF

C.

IPsec

D.

DHCP

E.

NTP

Buy Now
Questions 8

What is the purpose of the Switch Microservice of Policy Enforcer?

Options:

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

Buy Now
Questions 9

To analyze and detect malware, Juniper ATP Cloud performs which two functions? (Choose two.)

Options:

A.

cache lookup: to see if the file is seen already and known to be malicious

B.

antivirus scan: with a single vendor solution to see if the file contains any potential threats

C.

dynamic analysis: to see what happens if you execute the file in a real environment

D.

static analysis: to see what happens if you execute the file in a real environment

Buy Now
Questions 10

You want to enforce I DP policies on HTTP traffic.

In this scenario, which two actions must be performed on your SRX Series device? (Choose two )

Options:

A.

Choose an attacks type in the predefined-attacks-group HTTP-All.

B.

Disable screen options on the Untrust zone.

C.

Specify an action of None.

D.

Match on application junos-http.

Buy Now
Questions 11

Exhibit.

A hub member of an ADVPN is not functioning correctly.

Referring the exhibit, which action should you take to solve the problem?

Options:

A.

[edit interfaces]

root@vSRX-1# delete st0.0 multipoint

B.

[edit interfaces]

user@hub-1# delete ipsec vpn advpn-vpn traffic-selector

C.

[edit security]

user@hub-1# set ike gateway advpn-gateway advpn suggester disable

D.

[edit security]

user@hub-1# delete ike gateway advpn-gateway advpn partner

Buy Now
Questions 12

Your organization has multiple Active Directory domain to control user access. You must ensure that security polices are passing traffic based upon the user’s access rights.

What would you use to assist your SRX series devices to accomplish this task?

Options:

A.

JIMS

B.

Junos Space

C.

JSA

D.

JATP Appliance

Buy Now
Questions 13

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Buy Now
Questions 14

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

Options:

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Buy Now
Questions 15

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

Options:

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Buy Now
Questions 16

Exhibit

Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.

Which two commands will solve this problem? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 17

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

Options:

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Buy Now
Questions 19

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Buy Now
Questions 20

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

Options:

A.

A maximum of 32 tenant systems can be configured on a physical SRX device.

B.

All tenant systems share a single routing protocol process.

C.

Each tenant system runs its own instance of the routing protocol process

D.

A maximum of 500 tenant systems can be configured on a physical SRX device.

Buy Now
Questions 21

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

Options:

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Buy Now
Questions 22

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

Options:

A.

WELF

B.

JSON

C.

CEF

D.

binay

Buy Now
Questions 23

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

Options:

A.

The DNS doctoring ALG is not enabled by default.

B.

The Proxy ARP feature must be configured.

C.

The DNS doctoring ALG is enabled by default.

D.

The DNS CNAME record is translated.

Buy Now
Questions 24

What are two important function of the Juniper Networks ATP appliance solution? (Choose two.).

Options:

A.

Statistics

B.

Analysis

C.

Detection

D.

Filtration

Buy Now
Questions 25

In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)

Options:

A.

Send a custom message

B.

Close the connection.

C.

Drop the connection silently.

D.

Quarantine the host.

Buy Now
Questions 26

your company wants to take your juniper ATP appliance into private mode. You must give them a list

of impacted features for this request.

Which two features are impacted in this scenario? (Choose two)

Options:

A.

False Positive Reporting

B.

Threat Progression Monitoring

C.

GSS Telemetry

D.

Cyber Kill Chain mapping

Buy Now
Questions 27

You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)

Options:

A.

Enroll the devices with Juniper ATP Appliance.

B.

Enroll the devices with Juniper ATP Cloud.

C.

Enable a third-party Tor feed.

D.

Create a custom feed containing all current known MAC addresses.

Buy Now
Questions 28

you configured a security policy permitting traffic from the trust zone to the untrust zone but your

traffic not hitting the policy.

In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?

Options:

A.

show security policy-report

B.

show security application-tracking counters

C.

show security match-policies

D.

request security policies check

Buy Now
Questions 29

Exhibit

You have configured the SRX Series device to switch packets for multiple directly connected hosts that are within the same broadcast domain However, the traffic between two hosts in the same broadcast domain are not matching any security policies

Referring to the exhibit, what should you do to solve this problem?

Options:

A.

You must change the global mode to security switching mode.

B.

You must change the global mode to security bridging mode

C.

You must change the global mode to transparent bridge mode.

D.

You must change the global mode to switching mode.

Buy Now
Questions 30

You are required to secure a network against malware. You must ensure that in the event that a

compromised host is identified within the network. In this scenario after a threat has been

identified, which two components are responsible for enforcing MAC-level infected host ?

Options:

A.

SRX Series device

B.

Juniper ATP Appliance

C.

Policy Enforcer

D.

EX Series device

Buy Now
Questions 31

Your company uses non-Juniper firewalls and you are asked to provide a Juniper solution for zero-day malware protection. Which solution would work in this scenario?

Options:

A.

Juniper ATP Cloud

B.

Juniper Secure Analytics

C.

Juniper ATP Appliance

D.

Juniper Security Director

Buy Now
Questions 32

Exhibit

Referring to the exhibit, which three statements are true? (Choose three.)

Options:

A.

The packet's destination is to an interface on the SRX Series device.

B.

The packet's destination is to a server in the DMZ zone.

C.

The packet originated within the Trust zone.

D.

The packet is dropped before making an SSH connection.

E.

The packet is allowed to make an SSH connection.

Buy Now
Questions 33

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

Options:

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Buy Now
Questions 34

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

Options:

A.

The configured solution allows IPv6 to IPv4 translation.

B.

The configured solution allows IPv4 to IPv6 translation.

C.

The IPv6 address is invalid.

D.

External hosts cannot initiate contact.

Buy Now
Exam Code: JN0-636
Exam Name: Security, Professional (JNCIP-SEC)
Last Update: Nov 25, 2024
Questions: 115
JN0-636 pdf

JN0-636 PDF

$25.5  $84.99
JN0-636 Engine

JN0-636 Testing Engine

$30  $99.99
JN0-636 PDF + Engine

JN0-636 PDF + Testing Engine

$40.5  $134.99