Download Security, Specialist (JNCIS-SEC).Prep4sure.JN0-333.2018-12-23.1e.42q.vcex

Download Exam

File Info

Exam Security, Specialist (JNCIS-SEC)
Number JN0-333
File Name Security, Specialist (JNCIS-SEC).Prep4sure.JN0-333.2018-12-23.1e.42q.vcex
Size 1.2 Mb
Posted December 23, 2018
Downloads 42
Download Security, Specialist (JNCIS-SEC).Prep4sure.JN0-333.2018-12-23.1e.42q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

Which two statements about security policy actions are true? (Choose two.)

  • A: The log action implies an accept action.
  • B: The log action requires an additional terminating action.
  • C: The count action implies an accept action.
  • D: The count action requires an additional terminating action.

Correct Answer: BD

Question 2

Which two statements are true about global security policies? (Choose two.) 

  • A: Global security policies are evaluated before regular security policies.
  • B: Global security policies can be configured to match addresses across multiple zones.
  • C: Global security policies can match traffic regardless of security zones.
  • D: Global security policies do not support IPv6 traffic.

Correct Answer: BC

Question 3

Which statement is true about functional zones?

  • A: Functional zones are a collection of regulated transit network segments.
  • B: Functional zones provide a means of distinguishing groups of hosts and their resources from one another.
  • C: Functional zones are used for management.
  • D: Functional zones are the building blocks for security policies.

Correct Answer: C

Question 4

You have recently configured an IPsec tunnel between two SRX Series devices. One of the devices is assigned an IP address using DHCP with an IP address that changes frequently. Initial testing indicates that the IPsec tunnel is not working. Troubleshooting has revealed that Phase 1 negotiations are failing. 
Which two actions would solve the problem? (Choose two.)

  • A: Verify that the device with the IP address assigned by DHCP is the traffic initiator.
  • B: Verify that VPN monitoring is enabled.
  • C: Verify that the IKE policy is configured for aggressive mode.
  • D: Verify that PKI is properly configured.

Correct Answer: AC

Question 5


You have configured NAT on your network so that Host A can communicate with Server B. You want to ensure that Host C can initiate communication with Host A using Host A’s reflexive address. 
Referring to the exhibit, which parameter should you configure on the SRX Series device to satisfy this requirement?

  • A: Configure persistent NAT with the target-host parameter.
  • B: Configure persistent NAT with the target-host-port parameter.
  • C: Configure persistent NAT with the any-remote-host parameter.
  • D: Configure persistent NAT with the port-overloading parameter.

Correct Answer: A

Question 6

Which feature is used when you want to permit traffic on an SRX Series device only at specific times? 

  • A: scheduler
  • B: pass-through authentication
  • C: ALGs
  • D: counters

Correct Answer: A

Question 7

Which statement describes the function of NAT?

  • A: NAT encrypts transit traffic in a tunnel.
  • B: NAT detects various attacks on traffic entering a security device.
  • C: NAT translates a public address to a private address.
  • D: NAT restricts or permits users individually or in a group.

Correct Answer: C

Question 8


You are monitoring traffic, on your SRX300 that was configured using the factory default security parameters. You notice that the SRX300 is not blocking traffic between Host A and Host B as expected. 
Referring to the exhibit, what is causing this issue?

  • A: Host B was not assigned to the Untrust zone.
  • B: You have not created address book entries for Host A and Host B.
  • C: The default policy has not been committed.
  • D: The default policy permits intrazone traffic within the Trust zone.

Correct Answer: D

Question 9

What is the function of redundancy group 0 in a chassis cluster? 

  • A: Redundancy group 0 identifies the node controlling the cluster management interface IP addresses.
  • B: The primary node for redundancy group 0 identifies the first member node in a chassis cluster.
  • C: The primary node for redundancy group 0 determines the interface naming for all chassis cluster nodes.
  • D: The node on which redundancy group 0 is primary determines which Routing Engine is active in the cluster.

Correct Answer: D

Question 10

You want to protect your SRX Series device from the ping-of-death attack coming from the untrust security zone. 
How would you accomplish this task?

  • A: Configure the host-inbound-traffic system-services ping except parameter in the untrust security zone.
  • B: Configure the application tracking parameter in the untrust security zone.
  • C: Configure a from-zone untrust to-zone trust security policy that blocks ICMP traffic.
  • D: Configure the appropriate screen and apply it to the [edit security zone security-zone untrust] hierarchy.

Correct Answer: D





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files