Download Juniper.BrainDumps.JN0-333.2017-11-15.1e.54q.vcex

Download Exam

File Info

Exam Security, Specialist (JNCIS-SEC)
Number JN0-333
File Name Juniper.BrainDumps.JN0-333.2017-11-15.1e.54q.vcex
Size 1.44 Mb
Posted November 15, 2017
Downloads 41
Download Juniper.BrainDumps.JN0-333.2017-11-15.1e.54q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

You have configured source NAT with port address translation. You also need to guarantee that the same IP address is assigned from the source NAT pool to a specific host for multiple concurrent sessions. 
Which NAT parameter would meet this requirement? 

  • A: port block-allocation
  • B: port range twin-port
  • C: address-persistent
  • D: address-pooling paired

Correct Answer: D




Question 2

Click the Exhibit button. 
   

 
Referring to the exhibit, what will happen if client 172.16.128.50 tries to connect to destination 192.168.150.111 using HTTP? 

  • A: The client will be denied by policy p2.
  • B: The client will be denied by policy p1.
  • C: The client will be permitted by policy p2.
  • D: The client will be permitted by policy p1.

Correct Answer: D




Question 3

Click the Exhibit button. 
  

 
Which feature is enabled with destination NAT as shown in the exhibit?

  • A: NAT overload
  • B: block allocation
  • C: port translation
  • D: NAT hairprinting

Correct Answer: C




Question 4

Which two statements about security policy actions are true? (Choose two.)

  • A: The log action implies an accept action.
  • B: The log action requires an additional terminating action.
  • C: The count action implies an accept action.
  • D: The count action requires an additional terminating action.

Correct Answer: BD




Question 5

Which two statements are true about global security policies? (Choose two.)

  • A: Global security policies are evaluated before regular security policies.
  • B: Global security policies can be configured to match addresses across multiple zones.
  • C: Global security policies can match traffic regardless of security zones.
  • D: Global security policies do not support IPv6 traffic.

Correct Answer: BC




Question 6

Which statement is true about functional zones? 

  • A: Functional zones are a collection of regulated transit network segments.
  • B: Functional zones provide a means of distinguishing groups of hosts and their resources from one another.
  • C: Functional zones are used for management.
  • D: Functional zones are the building blocks for security policies.

Correct Answer: C




Question 7

You have recently configured an IPsec tunnel between two SRX Series devices. One of the devices is assigned an IP address using DHCP with an IP address that changes frequently. Initial testing indicates that the IPsec tunnel is not working. Troubleshooting has revealed that Phase 1 negotiations are failing. 
Which two actions would solve the problem? (Choose two.) 

  • A: Verify that the device with the IP address assigned by DHCP is the traffic initiator.
  • B: Verify that VPN monitoring is enabled.
  • C: Verify that the IKE policy is configured for aggressive mode.
  • D: Verify that PKI is properly configured.

Correct Answer: AC




Question 8

Click the Exhibit button. 
  

 
Which statement would explain why the IP-monitoring feature is functioning incorrectly?

  • A: The global weight value is too large for the configured global threshold.
  • B: The secondary IP address should be on a different subnet than the reth IP address.
  • C: The secondary IP address is the same as the reth IP address.
  • D: The monitored IP address is not on the same subnet as the reth IP address.

Correct Answer: C




Question 9

Click the Exhibit button. 
  

 
You have configured NAT on your network so that Host A can communicate with Server B. You want to ensure that Host C can initiate communication with Host A using Host A’s reflexive address. 
Referring to the exhibit, which parameter should you configure on the SRX Series device to satisfy this requirement?

  • A: Configure persistent NAT with the target-host parameter.
  • B: Configure persistent NAT with the target-host-port parameter.
  • C: Configure persistent NAT with the any-remote-host parameter.
  • D: Configure persistent NAT with the port-overloading parameter.

Correct Answer: A




Question 10

Which feature is used when you want to permit traffic on an SRX Series device only at specific times?

  • A: scheduler
  • B: pass-through authentication
  • C: ALGs
  • D: counters

Correct Answer: A










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files