Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Juniper.JN0-230.v2020-05-01.

q35
Exam Code: JN0-230
Exam Name: Security, Associate (JNCIA-SEC)
Certification Provider: Juniper
Free Question Number: 35
Version: v2020-05-01
# of views: 109
# of Questions views: 488
https://www.freecram.com/torrent/Juniper.JN0-230.v2020-05-01.q35.html

NEW QUESTION: 1
A new SRX Series device has been delivered to your location. The device has the factory-default
configuration loaded. You have powered on the device and connected to the console port.
What would you use to log into the device to begin the initial configuration?
A. Admin with password
B. Admin with a password ''juniper''
C. Root with a password of juniper''
D. Root with no password
Answer: C

NEW QUESTION: 2
You want to generate reports from the l-Web on an SRX Series device.
Which logging mode would you use in this scenario?
A. Stream
B. Syslog
C. local
D. Event
Answer: B

NEW QUESTION: 3
Which management software supports metadata-based security policies that are ideal for cloud
deployments?
A. Security Director
B. Sky Enterprise
C. Network Director
D. J-Web
Answer: B

NEW QUESTION: 4
Which statement about IPsec is correct?
A. IPsec can provide encapsulation but not encryption
B. IPsec is used to provide data replication
C. IPsec is a standards-based protocol.
D. IPsec can be used to transport native Layer 2 packets.
Answer: B

NEW QUESTION: 5
Which two private cloud solution support vSRX devices? (Choose two.)
A. VMware Web Services (AWS)
B. Amazon Web Services (AWS)
C. Contrail Cloud
D. VMware NSX
E. Microsoft Azure
Answer: A,E

NEW QUESTION: 6
Which statements is correct about global security policies?
A. Global security require you to identify a source and destination zone.
B. Traffic matching global is not added to the session table.
C. Global policies eliminate the need to assign interface to security zones.
D. Global policies allow you to regulate traffic with addresses and applications, regardless of their
security zones.
Answer: A

NEW QUESTION: 7
Which two statements are correct about functional zones? (Choose two.)
A. Functional zones separate groups of users based on their function.
B. Traffic received on the management interface in the functional zone cannot transit out other
interface.
C. A function is used for special purpose, such as management interface
D. A functional zone uses security policies to enforce rules for transit traffic.
Answer: A,C

NEW QUESTION: 8
Which two statements are true about the null zone? (Choose two.)
A. All interface belong to the bull zone by default.
B. All traffic to the null zone is allowed
C. All traffic to the null zone is dropped.
D. The null zone is a user-defined zone
Answer: B,D
NEW QUESTION: 9
Which two statements are correct about using global-based policies over zone-based policies?
(Choose two.)
A. With global-based policies, you do not need to specify a source zone in the match criteria.
B. With global-based policies, you do not need to specify a destination address in the match
criteria.
C. With global-based policies, you do not need to specify a destination zone in the match criteria.
D. With global-based policies, you do not need to specify a source address in the match criteria.
Answer: B,D

NEW QUESTION: 10
Which security object defines a source or destination IP address that is used for an employee
Workstation?
A. scheduler
B. Address book entry
C. Screen
D. Zone
Answer: D

NEW QUESTION: 11
Which two feature on the SRX Series device are common across all Junos devices? (Choose
two.)
A. screens
B. UTM services
C. Stateless firewall filters
D. The separation of control and forwarding planes
Answer: B,D

NEW QUESTION: 12
Firewall filters define which type of security?
A. Stateless
B. Dynamic enforcement
C. NGFW
D. Stateful
Answer: D

NEW QUESTION: 13
Which two statements are true about UTM on an SRX340? (Choose two.)
A. A default UTM policy is created.
B. A default UTM profile is created
C. No default profile is created.
D. No default UTM policy is created
Answer: B,C

NEW QUESTION: 14
What are two characteristic of static NAT SRX Series devices? (Choose two.)
A. Static NAT rule take precedence over source and destination NAT rules.
B. Static rules cannot coexist with destination NAT rules on the same SRX Series device
configuration.
C. Source and destination NAT rules take precedence over static NAT rules.
D. A reverse mapping rule is automatically created for the source translation.
Answer: A,B

NEW QUESTION: 15
Which UTM feature should you use to protect users from visiting certain blacklisted websites?
A. antispam
B. Antivirus
C. Content filtering
D. Web filtering
Answer: B

NEW QUESTION: 16
Which two elements are needed on an SRX Series device to set up a remote syslog server?
(Choose two.)
A. Data throughput
B. Data size
C. Data type
D. IP address
Answer: B,C

Valid JN0-230 Dumps shared by PrepAwayExam.com for Helping Passing JN0-230 Exam!
PrepAwayExam.com now offer the newest JN0-230 exam dumps, the PrepAwayExam.com
JN0-230 exam questions have been updated and answers have been corrected get the
newest PrepAwayExam.com JN0-230 dumps with Test Engine here:
https://www.prepawayexam.com/Juniper/braindumps.JN0-230.ete.file.html (65 Q&As Dumps,
40%OFF Special Discount: freecram)

NEW QUESTION: 17
What are configuring the antispam UTM feature on an SRX Series device.
Which two actions would be performed by the SRX Series device for e-mail that is identified as
spam?
(Choose two.)
A. Block the e-mail
B. Tag the e-mail
C. Queue the e-mail
D. Quarantine e-mail
Answer: A,B

NEW QUESTION: 18
Which two match conditions would be used in both static NAT and destination NAT rule sets?
(Choose two.)
A. Destination zone
B. Source interface
C. Source zone
D. Destination interface
Answer: A,D

NEW QUESTION: 19
What are the valid actions for a source NAT rule in J-Web? (choose three.)
A. On
B. Off
C. Pool
D. Source
E. interface
Answer: B,C,E
Explanation
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/nat-security-source-and-
source-pool.html

NEW QUESTION: 20
What is the correct order of processing when configuring NAT rules and security policies?
A. Policy lookup > source NAT > static NAT > destination NAT
B. Static NAT > destination NAT> policy lookup > source NAT
C. Source NAT > static NAT > destination NAT > policy lookup
D. Destination NAT > policy lookup > source NAT > static NAT
Answer: A

NEW QUESTION: 21
You are concerned that unauthorized traffic is using non-standardized ports on your network.
In this scenario, which type of security feature should you implement?
A. Firewall filters
B. Sky ATP
C. Zone-based policies
D. Application firewall
Answer: A

NEW QUESTION: 22
You have configured antispam to allow e-mail from example.com, however the logs you see that
jcart@example.com is blocked Referring to the exhibit.

What are two ways to solve this problem?


A. Add jcart@exmple.com to the profile antispam address whitelist.
B. Delete jcart@example.com from the profile antispam address blacklist
C. Verify connectivity with the SBL server.
D. Delete jcart@example.com from the profile antispam address whitelist
Answer: A

NEW QUESTION: 23
Which statement is correct about IKE?
A. IKE phase 1 is used to establish the data path
B. IKE phase 1 only support aggressive mode.
C. IKE phase 1 negotiates a secure channel between gateways.
D. IKE phase 1 establishes the tunnel between devices
Answer: C

NEW QUESTION: 24
Which three actions would be performed on traffic traversing an IPsec VPAN? (Choose three.)
A. Deep inspection
B. Payload verification
C. Port forwarding
D. Encryption
E. Authentication
Answer: B,D,E

NEW QUESTION: 25
What must you do first to use the Monitor/Events workspace in the j-Web interface?
A. You must enable security logging that uses the TLS transport mode.
B. You must enable security logging that uses the SD-Syslog format.
C. You must enable stream mode security logging on the SRX Series device
D. You must enable event mode security logging on the SRX Series device.
Answer: B

NEW QUESTION: 26
You configure and applied several global policies and some of the policies have overlapping
match criteria.
A. The most restrictive that matches is applied.
B. The least restrictive policy that matches is applied.
C. The first matched policy is the only policy applied.
D. In this scenario, how are these global policies applies?
Answer: D

NEW QUESTION: 27
What should you configure if you want to translate private source IP address to a single public IP
address?
A. Source NAT
B. Destination NAT
C. Content filtering
D. Security Director
Answer: D

NEW QUESTION: 28
Which type of security policy protect restricted services from running on non-standard ports?
A. Application firewall
B. antivirus
C. Sky ATP
D. IDP
Answer: A

NEW QUESTION: 29
On an SRX device, you want to regulate traffic base on network segments.
In this scenario, what do you configure to accomplish this task?
A. Zones
B. NAT
C. Screens
D. ALGs
Answer: C

NEW QUESTION: 30
BY default, revenue interface are placed into which system-defined security zone on an SRX
series device?
A. untrust
B. Null
C. Trust
D. Junos-trust
Answer: C

NEW QUESTION: 31
Users should not have access to Facebook, however, a recent examination of the logs security
show that users are accessing Facebook.
Referring to the exhibit,
what should you do to solve this problem?
A. Move the Block-Facebook-Access rule before the Internet-Access rule
B. Change the Internet-Access rule from a zone policy to a global policy
C. Move the Block-Facebook-Access rule from a zone policy to a global policy
D. Change the source address for the Block-Facebook-Access rule to the prefix of the users
Answer: D

Valid JN0-230 Dumps shared by PrepAwayExam.com for Helping Passing JN0-230 Exam!
PrepAwayExam.com now offer the newest JN0-230 exam dumps, the PrepAwayExam.com
JN0-230 exam questions have been updated and answers have been corrected get the
newest PrepAwayExam.com JN0-230 dumps with Test Engine here:
https://www.prepawayexam.com/Juniper/braindumps.JN0-230.ete.file.html (65 Q&As Dumps,
40%OFF Special Discount: freecram)

NEW QUESTION: 32
Which method do VPNs use to prevent outside parties from viewing packet in clear text?
A. Authentication
B. NAT_T
C. Encryption
D. Integrity
Answer: B

NEW QUESTION: 33
You are designing a new security policy on an SRX Series device. You must block an application
and log all occurrence of the application access attempts.
In this scenario, which two actions must be enabled in the security policy? (Choose two.)
A. Log the session closures
B. Enable a deny action
C. Log the session initiations
D. Enable a reject action
Answer: B,C

NEW QUESTION: 34
On an SRX Series device, how should you configure your IKE gateway if the remote endpoint is a
branch office-using a dynamic IP address?
A. Configure the IKE policy to use aggressive mode.
B. Configure the IPsec policy to use aggressive mode.
C. Configure the IKE policy to use a static IP address
D. Configure the IPsec policy to use MDS authentication.
Answer: D

NEW QUESTION: 35
Which two actions are performed on an incoming packet matching an existing session? (Choose
two.)
A. Security policy evolution
B. Zone processing
C. Screens processing
D. Service ALG processing
Answer: B,C

Valid JN0-230 Dumps shared by PrepAwayExam.com for Helping Passing JN0-230 Exam!
PrepAwayExam.com now offer the newest JN0-230 exam dumps, the PrepAwayExam.com
JN0-230 exam questions have been updated and answers have been corrected get the
newest PrepAwayExam.com JN0-230 dumps with Test Engine here:
https://www.prepawayexam.com/Juniper/braindumps.JN0-230.ete.file.html (65 Q&As Dumps,
40%OFF Special Discount: freecram)

You might also like