Download Juniper.JN0-1330.ActualTests.2018-10-13.35q.vcex

Download Exam

File Info

Exam Security Design, Specialist (JNCDS-SEC)
Number JN0-1330
File Name Juniper.JN0-1330.ActualTests.2018-10-13.35q.vcex
Size 935 KB
Posted Oct 13, 2018
Download Juniper.JN0-1330.ActualTests.2018-10-13.35q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which component of the Juniper NFV solution architecture acts as the VNF manager? 


  1. MetaFabric
  2. Service Control Gateway
  3. Contrail
  4. vSRX
Correct answer: C
Explanation:
Reference: https://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000633-en.pdf
Reference: https://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000633-en.pdf



Question 2

In the ever-changing threat landscape, you are seeking to deploy a dynamic anti-malware solution. 
What are three characteristics of the Sky Advanced Threat Prevention public cloud infrastructure? (Choose three.)


  1. Machine-learning algorithms adapt to and identify new malware.
  2. It provides rapid cache lookups to identify known files.
  3. Known malicious files are quickly identified and replicated to the firewall.
  4. It processes all known file types.
  5. It uses dynamic analysis including unique deception techniques.
Correct answer: ABE
Explanation:
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:Rapid cache lookups to identify known files.  Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
  • Rapid cache lookups to identify known files.  
  • Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape 
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf



Question 3

You are designing a Log Director deployment that must be able to handle 6,500 sustained events per second. 
What is the minimum deployment scenario?


  1. three Log Collector VMs and one Log Concentrator VM
  2. two Log Collector VMs and one Log Concentrator VM
  3. one Log Collector VM
  4. four Log Collector VMs and one Log Concentrator VM
Correct answer: B
Explanation:
Reference: https://www.juniper.net/techpubs/en_US/junos-space15.2/topics/concept/junos-space-log-collector-understanding.html
Reference: 
https://www.juniper.net/techpubs/en_US/junos-space15.2/topics/concept/junos-space-log-collector-understanding.html



Question 4

Which two components are required to implement a Contrail service chain? (Choose two.)


  1. AppSecure
  2. service policy
  3. Express Path
  4. virtual network
Correct answer: BD
Explanation:
Service chaining requires the following configuration components to build the chain: Service template  Virtual networks  Service instance  Network policy Reference: http://www.juniper.net/techpubs/en_US/vsrx15.1x49/information-products/pathway-pages/security-vsrx-contrail-quickstart-pwp.pdf
Service chaining requires the following configuration components to build the chain: 
  • Service template  
  • Virtual networks  
  • Service instance  
  • Network policy 
Reference: http://www.juniper.net/techpubs/en_US/vsrx15.1x49/information-products/pathway-pages/security-vsrx-contrail-quickstart-pwp.pdf



Question 5

You must implement access control lists to protect the control plane of a service provider’s core devices. 
What are two ways to accomplish this task? (Choose two.)


  1. Implement access control lists to filter RFC 1918 IP addresses from reaching the control plane.
  2. Implement access control lists to permit only internal management networks to reach the control plane.
  3. Implement access control lists to drop all IP packets that are fragments.
  4. Implement access control lists to protect the control plane against unauthorized user credentials.
Correct answer: BC



Question 6

What is the maximum number of SRX Series devices in a chassis cluster? 


  1. 2
  2. 3
  3. 4
  4. 5
Correct answer: A



Question 7

Due to changes in security requirements you must place a firewall between an existing Web server farm and a database server farm residing in the same subnet. 
In this scenario, why would you choose transparent mode as your operating mode?


  1. Transparent mode does not require zones to be configured.
  2. Transparent mode can be implemented with no changes to the current IP addresses.
  3. Transparent mode policies can be enforced based on MAC address ranges.
  4. Transparent mode allows only IP packets to pass through the security policies.
Correct answer: B



Question 8

Spotlight Secure provides which benefit?


  1. log management
  2. botnet protection
  3. centralized management of security devices
  4. IPsec encryption
Correct answer: C



Question 9

What are three characteristics of the integrated user firewall feature? (Choose three.)


  1. RADIUS user authentication is performed.
  2. Enforcement is performed at access.
  3. Best-effort user authentication is performed.
  4. Passive authentication is performed.
  5. Enforcement is performed at the firewall.
Correct answer: CDE
Explanation:
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/security-user-firewall-3-tier-understanding.html
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/security-user-firewall-3-tier-understanding.html



Question 10

You must design a solution to collect logs from a group of SRX Series devices using Junos Space Log Director. You will deploy this solution on virtual machines that will support traffic peaks up to 7,500 events per second.  
How would you accomplish this task?


  1. Implement one centralized log collector and continue the SRX Series clusters to forward logs to it.
  2. Implement one centralized log concentrator and configure the SRX Series clusters to forward logs to it.
  3. Implement one log concentrator, two log collectors, and a load balancer in front of them, configuring SRX Series devices to forward the logs to the Load Balancer VIP interface.
  4. Implement one log concentrator, three log collectors, and configure the SRX Series clusters to distribute the logs among the log collectors.
Correct answer: D
Explanation:
Reference: http://www.juniper.net/techpubs/en_US/junos-space14.1/logging-reporting/information-products/topic-collections/junos-space-security-director-logging-reporting-getting-started-guide.pdf
Reference: http://www.juniper.net/techpubs/en_US/junos-space14.1/logging-reporting/information-products/topic-collections/junos-space-security-director-logging-reporting-getting-started-guide.pdf









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files