Easter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

JN0-636 Sample Questions Answers

Questions 4

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

Options:

A.

1

B.

3

C.

4

D.

2

Buy Now
Questions 5

SRX Series device enrollment with Policy Enforcer fails To debug further, the user issues the following command show configuration services security—intelligence url

https : //cloudfeeds . argon . juniperaecurity . net/api/manifeat. xml

and receives the following output:

What is the problem in this scenario?

Options:

A.

The device is directly enrolled with Juniper ATP Cloud.

B.

The device is already enrolled with Policy Enforcer.

C.

The SRX Series device does not have a valid license.

D.

Junos Space does not have matching schema based on the

Buy Now
Questions 6

Exhibit:

Referring to the exhibit, your company’s infrastructure team implemented new printers

To make sure that the policy enforcer pushes the updated Ip address list to the SRX.

Which three actions are required to complete the requirement? (Choose three )

Options:

A.

Configure the server feed URL as http://172.25.10.254/myprinters

B.

Create a security policy that uses the dynamic address feed to allow access

C.

Configure Security Director to create a dynamic address feed

D.

Configure Security Director to create a C&C feed.

E.

Configure server feed URL as https://172.25.10.254/myprinters.

Buy Now
Questions 7

You are asked to allocate security profile resources to the interconnect logical system for it to work properly.

In this scenario, which statement is correct?

Options:

A.

The NAT resources must be defined in the security profile for the interconnect logical system.

B.

No resources are needed to be allocated to the interconnect logical system.

C.

The resources must be calculated based on the amount of traffic that will flow between the logical systems.

D.

The flow-session resource must be defined in the security profile for the interconnect logical system.

Buy Now
Questions 8

You are asked to deploy Juniper atp appliance in your network. You must ensure that incidents and

alerts are sent to your SIEM.

In this scenario, which logging output format is supported?

Options:

A.

WELF

B.

JSON

C.

CEF

D.

binay

Buy Now
Questions 9

Which two additional configuration actions are necessary for the third-party feed shown in the exhibit to work properly? (Choose two.)

Options:

A.

You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.

B.

You must create a dynamic address entry with the C&C category and the cc_offic365 value.

C.

You must apply the dynamic address entry in a security policy.

D.

You must apply the dynamic address entry in a security intelligence policy.

Buy Now
Questions 10

You want traffic to avoid the flow daemon for administrative task.

In this scenario which two stateless service are available with selective stateless packet based service. (Choose Two)

Options:

A.

Layer 2 switching

B.

IPv4 routing

C.

IPsec

D.

IPv6 routing

Buy Now
Questions 11

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

Options:

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Buy Now
Questions 12

Which two features would be used for DNS doctoring on an SRX Series firewall? (Choose two.)

Options:

A.

The DNS ALG must be enabled.

B.

static NAT

C.

The DNS ALG must be disabled.

D.

source NAT

Buy Now
Questions 13

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

Options:

A.

The DNS doctoring ALG is not enabled by default.

B.

The Proxy ARP feature must be configured.

C.

The DNS doctoring ALG is enabled by default.

D.

The DNS CNAME record is translated.

Buy Now
Questions 14

You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud

Which command will return this information?

Options:

A.

show security dynamic—address category—name CC | match 203.0.113.5

B.

show security dynamic—address category—name Infected—Hosts | match 203.0.113.5

C.

show security dynamic-address category-name IP Filter I match 203.0.113.5

D.

show Security dynamic-address category-name JWAS | match 203.0.113.5

Buy Now
Questions 15

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

Options:

A.

The packet is processed as host inbound traffic.

B.

The packet matches the default security policy.

C.

The packet matches a configured security policy.

D.

The packet is processed in the first path packet flow.

Buy Now
Questions 16

you configured a security policy permitting traffic from the trust zone to the untrust zone but your

traffic not hitting the policy.

In this scenario, which cli command allows you to troubleshoot traffic problem using the match criteria?

Options:

A.

show security policy-report

B.

show security application-tracking counters

C.

show security match-policies

D.

request security policies check

Buy Now
Questions 17

Which two modes are supported on Juniper ATP Cloud? (Choose two.)

Options:

A.

global mode

B.

transparent mode

C.

private mode

D.

Layer 3 mode

Buy Now
Questions 18

Exhibit:

Referring to the exhibit, which two statements are correct?

Options:

A.

All of the entries are a threat level 8

B.

All of the entries are command and control entries.

C.

All of the entries are Dshield entries

D.

All of the entries are a threat level 10.

Buy Now
Questions 19

Which three type of peer devices are supported for Cos-Based IPsec VPN?

Options:

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

Buy Now
Questions 20

You want to enable inter-tenant communica????on with tenant system.

In this Scenario, Which two solutions will accomplish this task?

Options:

A.

interconnect EVPN switch

B.

interconnect VPLS switch

C.

external router

D.

logical tunnel interface

Buy Now
Questions 21

You are asked to download and install the IPS signature database to a device operating in chassis cluster mode. Which statement is correct in this scenario?

Options:

A.

You must download and install the IPS signature package on the primary node.

B.

The first synchronization of the backup node and the primary node must be performed manually.

C.

The first time you synchronize the IPS signature package from the primary node to the backup node, the primary node must be rebooted.

D.

The IPS signature package must be downloaded and installed on the primary and backup nodes.

Buy Now
Questions 22

you must create a secure fabric in your company’s network

In this Scenario, Which three statements are correct? (Choose Three)

Options:

A.

MX Series device associated with tenants can belong to only one site

B.

A switch must be assigned to the site to enforce an infected host policy within the network

C.

SRX Series devices can belong to multiple sites

D.

SRX Series devices can belong to only one site

E.

Switches and connectors cannot be added to the same site

Buy Now
Questions 23

You are required to deploy a security policy on an SRX Series device that blocks all known Tor network IP addresses. Which two steps will fulfill this requirement? (Choose two.)

Options:

A.

Enroll the devices with Juniper ATP Appliance.

B.

Enroll the devices with Juniper ATP Cloud.

C.

Enable a third-party Tor feed.

D.

Create a custom feed containing all current known MAC addresses.

Buy Now
Questions 24

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

Options:

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Buy Now
Questions 25

Click the Exhibit button.

Which type of NAT is shown in the exhibit?

Options:

A.

NAT46

B.

NAT64

C.

persistent NAT

D.

DS-Lite

Buy Now
Questions 26

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

Options:

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Buy Now
Questions 27

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

Options:

A.

Configure the tenant as TSYS1 for the pi security profile.

B.

Configure the tenant as root for the pi security profile.

C.

Configure the tenant as master for the pi security profile.

D.

Configure the tenant as local for the pi security profile

Buy Now
Questions 28

You want to use selective stateless packet-based forwarding based on the source address.

In this scenario, which command will allow traffic to bypass the SRX Series device flow daemon?

Options:

A.

set firewall family inet filter bypaa3_flowd term t1 then skip—services accept

B.

set firewall family inet filter bypass_flowd term t1 then routing-instance stateless

C.

set firewall family inet filter bypas3_flowd term t1 then virtual-channel stateless

D.

set firewall family inet filter bypass__f lowd term t1 then packet—mode

Buy Now
Questions 29

Which two types of source NAT translations are supported in this scenario? (Choose two.)

Options:

A.

translation of IPv4 hosts to IPv6 hosts with or without port address translation

B.

translation of one IPv4 subnet to one IPv6 subnet with port address translation

C.

translation of one IPv6 subnet to another IPv6 subnet without port address translation

D.

translation of one IPv6 subnet to another IPv6 subnet with port address translation

Buy Now
Questions 30

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

Options:

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Buy Now
Questions 31

You are requested to enroll an SRX Series device with Juniper ATP Cloud.

Which statement is correct in this scenario?

Options:

A.

If a device is already enrolled in a realm and you enroll it in a new realm, the device data or configuration information is propagated to the new realm.

B.

The only way to enroll an SRX Series device is to interact with the Juniper ATP Cloud Web portal.

C.

When the license expires, the SRX Series device is disenrolled from Juniper ATP Cloud without a grace period

D.

Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series device to connect to the Juniper ATP Cloud service.

Buy Now
Questions 32

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

Options:

A.

VRF instances

B.

virtual router instances

C.

logical systems

D.

tenant systems

Buy Now
Questions 33

Exhibit

You are using traceoptions to verify NAT session information on your SRX Series device. Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This is the last packet in the session.

B.

The SRX Series device is performing both source and destination NAT on this session.

C.

This is the first packet in the session.

D.

The SRX Series device is performing only source NAT on this session.

Buy Now
Questions 34

Your company wants to use the Juniper Seclntel feeds to block access to known command and control servers, but they do not want to use Security Director to manage the feeds.

Which two Juniper devices work in this situation? (Choose two)

Options:

A.

EX Series devices

B.

MX Series devices

C.

SRX Series devices

D.

QFX Series devices

Buy Now
Exam Code: JN0-636
Exam Name: Security, Professional (JNCIP-SEC)
Last Update: May 14, 2024
Questions: 115
$64  $159.99
$48  $119.99
$40  $99.99
buy now JN0-636