Download Juniper.JN0-633.Pass4Sure.2019-03-05.181q.vcex

Download Exam

File Info

Exam Juniper Networks Certified Professional Security (JNCIP-SEC)
Number JN0-633
File Name Juniper.JN0-633.Pass4Sure.2019-03-05.181q.vcex
Size 3 MB
Posted Mar 05, 2019
Download Juniper.JN0-633.Pass4Sure.2019-03-05.181q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What are two network scanning methods? (Choose two.)


  1. SYN flood
  2. ping of death
  3. ping sweep
  4. UDP scan
Correct answer: CD
Explanation:
The question is about the network scanning. So correct answers are ping sweep and UDP scan as both are port scanning types. Reference: URL: http://althing.cs.dartmouth.edu/local/Network_Scanning_Techniques.pdf
The question is about the network scanning. So correct answers are ping sweep and UDP scan as both are port scanning types. 
Reference: URL: http://althing.cs.dartmouth.edu/local/Network_Scanning_Techniques.pdf



Question 2

What are two intrusion protection mechanisms available on SRX Series Services Gateways? (Choose two.)


  1. routing update detection
  2. traffic anomaly detection
  3. NAT anomaly protection
  4. DoS protection
Correct answer: BD
Explanation:
Juniper IPS system prevents Traffic Anamoly detection and DoS/DDoS attacks. Reference: http://www.juniper.net/in/en/products-services/software/router-services/ips/
Juniper IPS system prevents Traffic Anamoly detection and DoS/DDoS attacks. 
Reference: http://www.juniper.net/in/en/products-services/software/router-services/ips/



Question 3

What is a benefit of using a dynamic VPN?


  1. It provides a layer of redundancy on top of a point-to-point VPN mesh architecture.
  2. It eliminates the need for point-to-point VPN tunnels.
  3. It provides a way to grant VPN access on a per-user-group basis.
  4. It simplifies IPsec access for remote clients.
Correct answer: D
Explanation:
Reference: http://tutarticle.com/networking/benefits-of-dynamic-multipoint-vpn-dmvpn/
Reference: http://tutarticle.com/networking/benefits-of-dynamic-multipoint-vpn-dmvpn/



Question 4

What is a benefit of using a group VPN?


  1. It provides a layer of redundancy on top of a point-to-point VPN mesh architecture.
  2. It eliminates the need for point-to-point VPN tunnels.
  3. It provides a way to grant VPN access on a per-user-group basis.
  4. It simplifies IPsec access for remote clients.
Correct answer: B
Explanation:
Reference : Page 4http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCkQFjAA&url=http%3A%2F %2Fwww.thomas-krenn.com%2Fredx%2Ftools%2Fmb_download.php %2Fmid.x6d7672335147784949386f3d%2FManual_Configuring_Group_VPN_Juniper_SRX.pdf %3Futm_source%3Dthomas-krenn.com%26utm_medium%3DRSS-Feed%26utm_content %3DConfiguring%2520Group%2520VPN%26utm_campaign%3DDownloads&ei=C2HrUaSWD8WJrQfXxYGYBA&usg=AFQjCNFgKnv9ZLwqZMmbzAfvGDPvoMz7dw&b vm=bv.49478099,d.bmk
Reference : Page 4
http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCkQFjAA&url=http%3A%2F %2Fwww.thomas-krenn.com%2Fredx%2Ftools%2Fmb_download.php %2Fmid.x6d7672335147784949386f3d%2FManual_Configuring_Group_VPN_Juniper_SRX.pdf %3Futm_source%3Dthomas-krenn.com%26utm_medium%3DRSS-Feed%26utm_content %3DConfiguring%2520Group%2520VPN%26utm_campaign%3DDownloads&ei=C2HrUaSWD8WJrQfXxYGYBA&usg=AFQjCNFgKnv9ZLwqZMmbzAfvGDPvoMz7dw&b vm=bv.49478099,d.bmk



Question 5

Which statement is true about Layer 2 zones when implementing transparent mode security?


  1. All interfaces in the zone must be configured with the protocol family mpls.
  2. All interfaces in the zone must be configured with the protocol family inet.
  3. All interfaces in the zone must be configured with the protocol family bridge.
  4. All interfaces in the zone must be configured with the protocol family inet6.
Correct answer: C
Explanation:
Reference (page no 12) http://www.juniper.net/techpubs/en_US/junos12.1x44/information- products/pathway-pages/security/security-layer2-bridging-transparent-mode.pdf
Reference (page no 12) http://www.juniper.net/techpubs/en_US/junos12.1x44/information- products/pathway-pages/security/security-layer2-bridging-transparent-mode.pdf



Question 6

What are two AppSecure modules? (Choose two.)


  1. AppDoS
  2. AppFlow
  3. AppTrack
  4. AppNAT
Correct answer: AC
Explanation:
Reference : Page No 2 Figure 1http://www.juniper.net/us/en/local/pdf/datasheets/1000327-en.pdf
Reference : Page No 2 Figure 1
http://www.juniper.net/us/en/local/pdf/datasheets/1000327-en.pdf



Question 7

You are working as a security administrator and must configure a solution to protect against distributed botnet attacks on your company's central SRX cluster. 
How would you accomplish this goal?


  1. Configure AppTrack to inspect and drop traffic from the malicious hosts.
  2. Configure AppQoS to block the malicious hosts.
  3. Configure AppDoS to rate limit connections from the malicious hosts.
  4. Configure AppID with a custom application to block traffic from the malicious hosts.
Correct answer: C
Explanation:
Reference : Page No 2 Figure 1http://www.juniper.net/us/en/local/pdf/datasheets/1000327-en.pdf
Reference : Page No 2 Figure 1
http://www.juniper.net/us/en/local/pdf/datasheets/1000327-en.pdf



Question 8

You are asked to change the configuration of your company's SRX device so that you can block nested traffic from certain Web sites, but the main pages of these Web sites must remain available to users. Which two methods will accomplish this goal? (Choose two.)


  1. Enable the HTTP ALG.
  2. Implement a firewall filter for Web traffic.
  3. Use an IDP policy to inspect the Web traffic.
  4. Configure an application firewall rule set.
Correct answer: BD
Explanation:
Reference: An application layer gateway (ALG) is a feature on ScreenOS gateways that enables the gateway to parse application layer payloads and take decisions on them. ALGs are typically employed to support applications that use the application layer payload to communicate the dynamic Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports on which the applications open data connections (http://kb.juniper.net/InfoCenter/index?page=content&id=KB13530)IDP policy defines the rule for defining the type of traffic permitted on network (http://www.juniper.net/techpubs/software/junos-security/junos-security95/junos-security-swconfig- security/enable-idp-security-policy-section.html)
Reference: An application layer gateway (ALG) is a feature on ScreenOS gateways that enables the gateway to parse application layer payloads and take decisions on them. ALGs are typically employed to support applications that use the application layer payload to communicate the dynamic Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports on which the applications open data connections (http://kb.juniper.net/InfoCenter/index?page=content&id=KB13530)
IDP policy defines the rule for defining the type of traffic permitted on network (http://www.juniper.net/techpubs/software/junos-security/junos-security95/junos-security-swconfig- security/enable-idp-security-policy-section.html)



Question 9

You are using the AppDoS feature to control against malicious bot client attacks. The bot clients are using file downloads to attack your server farm. You have configured a context value rate of 10,000 hits in 60 seconds. At which threshold will the bot clients no longer be classified as malicious?


  1. 5000 hits in 60 seconds
  2. 8000 hits in 60 seconds
  3. 7500 hits in 60 seconds
  4. 9999 hits in 60 seconds
Correct answer: B
Explanation:
Reference :http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig- security/appddos-protection-overview.html
Reference :
http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig- security/appddos-protection-overview.html



Question 10

Your company's network has seen an increase in Facebook-related traffic. You have been asked to restrict the amount of Facebook-related traffic to less than 100 Mbps regardless of congestion. What are three components used to accomplish this task? (Choose three.)


  1. IDP policy
  2. application traffic control
  3. application firewall
  4. security policy
  5. application signature
Correct answer: BDE
Explanation:
An IDP policy defines how your device handles the network traffic. It will not limit the rate. Reference: http://www.juniper.net/techpubs/software/junos-security/junos-security96/junos-security- swconfig-security/idp-policy-overview-section.html) Application Firewall enforces protocol and policy control at Layer 7. It inspects the actual content of the payload and ensures that it conforms to the policy, rather than limiting the rate. Reference: http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/application- firewall-overview.html
An IDP policy defines how your device handles the network traffic. It will not limit the rate. Reference: http://www.juniper.net/techpubs/software/junos-security/junos-security96/junos-security- swconfig-security/idp-policy-overview-section.html) Application Firewall enforces protocol and policy control at Layer 7. It inspects the actual content of the payload and ensures that it conforms to the policy, rather than limiting the rate. Reference: http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/application- firewall-overview.html









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files