Download Juniper.JN0-1330.PracticeTest.2018-04-09.36q.vcex

Download Exam

File Info

Exam Security Design, Specialist (JNCDS-SEC)
Number JN0-1330
File Name Juniper.JN0-1330.PracticeTest.2018-04-09.36q.vcex
Size 1 MB
Posted Apr 09, 2018
Download Juniper.JN0-1330.PracticeTest.2018-04-09.36q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You must implement access control lists to protect the control plane of a service provider’s core devices. 
What are two ways to accomplish this task? (Choose two.)


  1. Implement access control lists to filter RFC 1918 IP addresses from reaching the control plane.
  2. Implement access control lists to permit only internal management networks to reach the control plane.
  3. Implement access control lists to drop all IP packets that are fragments.
  4. Implement access control lists to protect the control plane against unauthorized user credentials.
Correct answer: BC



Question 2

What is the maximum number of SRX Series devices in a chassis cluster?


  1. 2
  2. 3
  3. 4
  4. 5
Correct answer: A



Question 3

Due to changes in security requirements you must place a firewall between an existing Web server farm and a database server farm residing in the same subnet. 
In this scenario, why would you choose transparent mode as your operating mode?


  1. Transparent mode does not require zones to be configured.
  2. Transparent mode can be implemented with no changes to the current IP addresses.
  3. Transparent mode policies can be enforced based on MAC address ranges.
  4. Transparent mode allows only IP packets to pass through the security policies.
Correct answer: B



Question 4

Spotlight Secure provides which benefit?


  1. log management
  2. botnet protection
  3. centralized management of security devices
  4. IPsec encryption
Correct answer: C



Question 5

What are three characteristics of the integrated user firewall feature? (Choose three.)


  1. RADIUS user authentication is performed.
  2. Enforcement is performed at access.
  3. Best-effort user authentication is performed.
  4. Passive authentication is performed.
  5. Enforcement is performed at the firewall.
Correct answer: CDE
Explanation:
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/security-user-firewall-3-tier-understanding.html
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/security-user-firewall-3-tier-understanding.html



Question 6

You must design a solution to collect logs from a group of SRX Series devices using Junos Space Log Director. You will deploy this solution on virtual machines that will support traffic peaks up to 7,500 events per second.  
How would you accomplish this task?


  1. Implement one centralized log collector and continue the SRX Series clusters to forward logs to it.
  2. Implement one centralized log concentrator and configure the SRX Series clusters to forward logs to it.
  3. Implement one log concentrator, two log collectors, and a load balancer in front of them, configuring SRX Series devices to forward the logs to the Load Balancer VIP interface.
  4. Implement one log concentrator, three log collectors, and configure the SRX Series clusters to distribute the logs among the log collectors.
Correct answer: D
Explanation:
Reference: http://www.juniper.net/techpubs/en_US/junos-space14.1/logging-reporting/information-products/topic-collections/junos-space-security-director-logging-reporting-getting-started-guide.pdf
Reference: http://www.juniper.net/techpubs/en_US/junos-space14.1/logging-reporting/information-products/topic-collections/junos-space-security-director-logging-reporting-getting-started-guide.pdf



Question 7

You are asked to implement port-based authentication on your access switches. Security and ease of access are the two primary requirements. 
Which authentication solution satisfies these requirements?


  1. MAC RADIUS
  2. network access control
  3. firewall authentication
  4. IPsec tunnel
Correct answer: A
Explanation:
Reference: https://www.juniper.net/documentation/en_US/junos12.1x46/topics/concept/layer-2-8021x-port-network-authentication-security-understanding.html
Reference: https://www.juniper.net/documentation/en_US/junos12.1x46/topics/concept/layer-2-8021x-port-network-authentication-security-understanding.html



Question 8

What is one way to increase the security of a site-to-site IPsec VPN tunnel?


  1. Implement a stronger Diffie-Hellman group.
  2. Change IKE Phase 1 from main mode to aggressive mode.
  3. Implement traffic selectors.
  4. Implement a policy-based VPN.
Correct answer: C



Question 9

Your customer is planning the deployment of a new hub-and-spoke WAN architecture that must support dual stack. They have decided against using a dynamic routing protocol. They are concerned about the difficulty of managing configurations and operations at the hub location as they deploy branch routers.  
In this scenario, what are three reasons for selecting route-based VPNs with traffic selectors? (Choose three.)


  1. Traffic selectors support IPv4 and IPv6.
  2. Traffic selectors reduce the number of Phase 2 IPsec security associations.
  3. Traffic selectors reduce latency because they bypass UTM.
  4. Traffic selectors support auto route insertion.
  5. You can define multiple traffic selectors within a single route-based VPN.
Correct answer: ADE
Explanation:
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/ipsec-vpn-traffic-selector-understanding.html
Reference: http://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/ipsec-vpn-traffic-selector-understanding.html



Question 10

What are the three activities in the reconnaissance phase of an attack? (Choose three.)


  1. Determine the device OS.
  2. Scan for devices and ports to exploit.
  3. Install malware.
  4. Propagate the virus to servers and workstations.
  5. Map the network.
Correct answer: ABE









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files