Download Juniper.JN0-634.PracticeTest.2019-01-28.39q.vcex

Download Exam

File Info

Exam Security, Professional (JNCIP-SEC)
Number JN0-634
File Name Juniper.JN0-634.PracticeTest.2019-01-28.39q.vcex
Size 1 MB
Posted Jan 28, 2019
Download Juniper.JN0-634.PracticeTest.2019-01-28.39q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You want to review AppTrack statistics to determine the characteristics of the traffic being monitored. 
Which operational mode command would accomplish this task on an SRX Series device?


  1. show services application-identification statistics applications
  2. show services application-identification application detail
  3. show security application-tracking counters
  4. show services security-intelligence statistics
Correct answer: A
Explanation:



Question 2

Which AppSecure feature identifies applications that are present in traffic?


  1. AppID
  2. AppTrack
  3. AppFW
  4. AppQoS
Correct answer: A



Question 3

What is the correct application mapping sequence when a user goes to Facebook for the first time through an SRX Series device?


  1. first packet > process packet > check application system cache > classify application > process packet > match and identify application
  2. first packet > check application system cache > process packet > classify application > match and identify application
  3. first packet > check application system cache > classify application > process packet > match and identify application
  4. first packet > process packet > check application system cache > classify application > match and identify application
Correct answer: D



Question 4

You have been notified by your colocation provider that your infrastructure racks will no longer be adjacent to each other. 
In this scenario, which technology would you use to secure all Layer 2 and Layer 3 traffic between racks?


  1. IPsec
  2. GRE 
  3. 802.1BR
  4. MACsec
Correct answer: D



Question 5

You need to add all of the sites in the domain example.com to urllist2. You decide to use wildcards to account for any changes made to the domain in the future. 
In this scenario, which two commands would you use to meet this requirement? (Choose two.)


  1. set custom-objects url-pattern urllist2 value http://*.example.com
  2. set custom-objects url-pattern urllist2 value http://*example.com
  3. set custom-objects url-pattern urllist2 value http://*.example.???
  4. set custom-objects url-pattern urllist2 value http://*.example.*
Correct answer: AC



Question 6

What is a function of UTM?


  1. AppFW
  2. IPsec
  3. content filtering
  4. bridge mode
Correct answer: C
Explanation:



Question 7

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restarted to the VLANs from which they originate. 
Which configuration accomplishes these objectives? 


  1. bridge {
    block-non-ip-all; 
    bpdu-vlan-flooding; 
  2. bridge {
    block-non-ip-all; 
    bypass-non-ip-unicast; 
    no-packet-flooding; 
  3. bridge {
    bypass-non-ip-unicast; 
    bpdu-vlan-flooding; 
  4. bridge {
    block-non-ip-all; 
    bypass-non-ip-unicast; 
    bpdu-vlan-flooding; 
    }
Correct answer: A



Question 8

You have configured a log collector VM and Security Director. System logging is enabled on a branch SRX Series device, but security logs do not appear in the monitor charts. 
How would you solve this problem?


  1. Configure a security policy to forward logs to the collector.
  2. Configure application identification on the SRX Series device.
  3. Configure security logging on the SRX Series device.
  4. Configure J-Flow on the SRX Series device.
Correct answer: C



Question 9

  
Referring to the configuration shown in the exhibit, which statement explains why traffic matching the IDP signature DNS:OVERFLOW:TOO-LONG-TCP-MSG is not being stopped by the SRX Series device?


  1. The security policy dmz-pol1 has an action of permit.
  2. The IDP policy idp-pol1 is not configured as active.
  3. The IDP rule r2 has an ip-action value of notify.
  4. The IDP rule r1 has an action of ignore-connection.
Correct answer: B



Question 10

  
Which statement explains the current state value of the command output shown in the exhibit?


  1. A valid response was received from a domain PC probe, and the user is a valid domain user programmed in the PFE.
  2. An invalid response was received from a domain PC probe, and the user is an invalid domain user.
  3. A probe event generated an entry in the authentication table, but no probe response has been received from the domain PC.
  4. The user-to-address mapping was successfully read from the domain controller event logs, and an entry was added to the authentication table witch currently resides on the Routing Engine.
Correct answer: A
Explanation:









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files