Download Juniper.JN0-334.PassLeader.2021-05-10.30q.vcex

Download Exam

File Info

Exam Security, Specialist
Number JN0-334
File Name Juniper.JN0-334.PassLeader.2021-05-10.30q.vcex
Size 18 KB
Posted May 10, 2021
Download Juniper.JN0-334.PassLeader.2021-05-10.30q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What are two types of collectors for the JATP core engine? (Choose two.)


  1. SNMP
  2. e-mail
  3. Web
  4. telemetry
Correct answer: BC
Explanation:
https://www.juniper.net/documentation/en_US/release-independent/jatp/information-products/pathway-pages/jatp-core-central-manager-quick-start-guide.pdf (page 15)
https://www.juniper.net/documentation/en_US/release-independent/jatp/information-products/pathway-pages/jatp-core-central-manager-quick-start-guide.pdf (page 15)



Question 2

Which statement is true about JATP incidents?


  1. Incidents have an associated threat number assigned to them.
  2. Incidents are sorted by category, followed by seventy.
  3. Incidents consist of all the events associated with a single threat.
  4. Incidents are always automatically mitigated.
Correct answer: C



Question 3

You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers. Which feature should you implement to satisfy this requirement?


  1. SSL proxy
  2. AppSecure
  3. JIMS
  4. JATP
Correct answer: A



Question 4

Which feature supports sandboxing of zero-day attacks?


  1. Sky ATP 
  2. SSL proxy
  3. ALGs
  4. high availability
Correct answer: B



Question 5

Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)


  1. When a rule is triggered, JSA can respond by sending an e-mail to JSA administrators.
  2. Rules are defined on Junos Space Security Director, and then pushed to JSA log collectors.
  3. A rule defines matching criteria and actions that should be taken when an event matches the rule.
  4. When a rule is triggered, JSA can respond by blocking all traffic from a specific source address.
Correct answer: BD



Question 6

Which solution should you use if you want to detect known attacks using signature-based methods?


  1. SSL proxy
  2. JIMS
  3. IPS
  4. ALDs
Correct answer: D



Question 7

Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)


  1. Sky
  2. ATP
  3. JATP
  4. UIPS
Correct answer: CD



Question 8

You are using the JIMS Administrator user interface to add multiple SRX client devices You must share common configuration attributes across the SRX clients without having to re-enter those attributes for each SRX client instance. 
Which JIMS Administrator feature would be used to accomplish this task?


  1. JIMS automation
  2. JIMS templates
  3. JIMS client profiles
  4. JIMS client defaults
Correct answer: B



Question 9

Which two statements are true about virtualized SRX Series devices? (Choose two.)  
  


  1. vSRX cannot be deployed in transparent mode.
  2. cSRX can be deployed in routed mode.
  3. cSRX cannot be deployed in routed mode.
  4. vSRX can be deployed in transparent mode.
Correct answer: AD



Question 10

Which security log message formal reduces the consumption of CPU and storage?


  1. WELF
  2. BSD syslog
  3. binary
  4. structured syslog
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files