Download Juniper.JN0-1330.ExamLabs.2019-02-27.65q.tqb

Download Exam

File Info

Exam Security Design, Specialist (JNCDS-SEC)
Number JN0-1330
File Name Juniper.JN0-1330.ExamLabs.2019-02-27.65q.tqb
Size 2 MB
Posted Feb 27, 2019
Download Juniper.JN0-1330.ExamLabs.2019-02-27.65q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which security solution protects against zero-day attacks?


  1. DDoS protection
  2. advanced anti-malware
  3. content filtering
  4. Application Layer Gateways
Correct answer: B



Question 2

Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)


  1. Dynamic analysis involves unique deception techniques.
  2. Machine-learning algorithms are enabled to adapt to and identify new malware.
  3. Rapid cache lookups are used to quickly identify known files.
  4. Files are flagged for next-day analysis for certain malware types.
  5. It uses a single, best-in-class antivirus engine.
Correct answer: ABC
Explanation:
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:Rapid cache lookups to identify known files.  Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
  • Rapid cache lookups to identify known files.  
  • Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape 
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf



Question 3

Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location. 
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)


  1. HTTP
  2. SCP
  3. TFTP
  4. FTP
  5. CIFS
Correct answer: ABD
Explanation:
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files