Download Security, Specialist (JNCIS-SEC).certkey.JN0-333.2018-10-01.1e.64q.vcex

Download Exam

File Info

Exam Security, Specialist (JNCIS-SEC)
Number JN0-333
File Name Security, Specialist (JNCIS-SEC).certkey.JN0-333.2018-10-01.1e.64q.vcex
Size 2.25 Mb
Posted October 01, 2018
Downloads 23
Download Security, Specialist (JNCIS-SEC).certkey.JN0-333.2018-10-01.1e.64q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

What are two supported hypervisors for hosting a vSRX? (Choose two.)

  • A: VMware ESXi
  • B: Solaris Zones
  • C: KVM
  • D: Docker

Correct Answer: AC

Question 2

You are asked to change when your SRX high availability failover occurs. One network interface is considered more important than others in the high availability configuration. You want to prioritize failover based on the state of that interface. 
Which configuration would accomplish this task?

  • A: Create a VRRP group configuration that lists the reth’s IP address as the VIP while using each physical interface that make up the reth definition of each SRX HA pair.
  • B: Configure IP monitoring of the important interface’s IP address and adjust the heartbeat interval and heartbeat threshold to the shortest settings.
  • C: Create a separate redundancy group to isolate the important interface; set the priority of the new redundancy group to 255.
  • D: Configure interface monitor inside the redundancy group that contains the important physical interface; adjust the weight associated with the monitored interface to 255.

Correct Answer: D

Question 3

Which three Encapsulating Security Payload protocols do the SRX Series devices support with IPsec? (Choose three.)

  • A: DES
  • B: RC6
  • C: TLS
  • D: AES
  • E: 3DES

Correct Answer: ADE

Question 4

What are three characteristics of session-based forwarding, compared to packet-based forwarding, on an SRX Series device? (Choose three.)

  • A: Session-based forwarding uses stateful packet processing.
  • B: Session-based forwarding requires less memory.
  • C: Session-based forwarding performs faster processing of existing session.
  • D: Session-based forwarding uses stateless packet processing,
  • E: Session-based forwarding uses six tuples of information.

Correct Answer: ACE

Question 5

You have configured source NAT with port address translation. You also need to guarantee that the same IP address is assigned from the source NAT pool to a specific host for multiple concurrent sessions. 
Which NAT parameter would meet this requirement? 

  • A: port block-allocation
  • B: port range twin-port
  • C: address-persistent
  • D: address-pooling paired

Correct Answer: D

Question 6


Referring to the exhibit, what will happen if client tries to connect to destination using HTTP?

  • A: The client will be denied by policy p2.
  • B: The client will be denied by policy p1.
  • C: The client will be permitted by policy p2.
  • D: The client will be permitted by policy p1.

Correct Answer: D

Question 7


Which feature is enabled with destination NAT as shown in the exhibit?

  • A: NAT overload
  • B: block allocation
  • C: port translation
  • D: NAT hairprinting

Correct Answer: C

Question 8

Which two statements about security policy actions are true? (Choose two.)

  • A: The log action implies an accept action.
  • B: The log action requires an additional terminating action.
  • C: The count action implies an accept action.
  • D: The count action requires an additional terminating action.

Correct Answer: BD

Question 9

Which two statements are true about global security policies? (Choose two.)

  • A: Global security policies are evaluated before regular security policies.
  • B: Global security policies can be configured to match addresses across multiple zones.
  • C: Global security policies can match traffic regardless of security zones.
  • D: Global security policies do not support IPv6 traffic.

Correct Answer: BC

Question 10

Which statement is true about functional zones?

  • A: Functional zones are a collection of regulated transit network segments.
  • B: Functional zones provide a means of distinguishing groups of hosts and their resources from one another.
  • C: Functional zones are used for management.
  • D: Functional zones are the building blocks for security policies.

Correct Answer: C





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files