Question #80
In J-Web, the management and loopback address configuration option allows you to configure which area?
- A. the IP address of the primary Gigabit Ethernet port
- B. the IP address of the Network Time Protocol server
- C. the CIDR address
- D. the IP address of the device management port
Correct Answer: C
Question #81
You are installing a new SRX Series device and you are only provided one IP address from your ISP.
In this scenario, which NAT solution would you implement?
- A. pool-based NAT with PAT
- B. pool-based NAT with address shifting
- C. interface-based source NAT
- D. pool-based NAT without PAT
Correct Answer: C
Question #82
Which two statements are correct about IPsec security associations? (Choose two.)
- A. IPsec security associations are bidirectional.
- B. IPsec security associations are unidirectional.
- C. IPsec security associations are established during IKE Phase 1 negotiations.
- D. IPsec security associations are established during IKE Phase 2 negotiations.
Correct Answer: AC
Question #83
You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a “single pane of glass” cloud-based solution.
Which solution satisfies the requirement?
- A. Juniper Sky Enterprise
- B. J-Web
- C. Junos Secure Connect
- D. Junos Space
Correct Answer: D
Question #84
What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?
- A. 3
- B. 4
- C. 2
- D. 5
Correct Answer: C
Question #85
You need to collect the serial number of an SRX Series device to replace it.
Which command will accomplish this task?
- A. show chassis hardware
- B. show system information
- C. show chassis firmware
- D. show chassis environment
Correct Answer: B
Question #86
Which statement is correct about Junos security policies?
- A. Security policies enforce rules that should be applied to traffic transiting an SRX Series device.
- B. Security policies determine which users are allowed to access an SRX Series device.
- C. Security policies control the flow of internal traffic within an SRX Series device.
- D. Security policies identify groups of users that have access to different features on an SRX Series device.
Correct Answer: A
Question #87
Which two statements about the Junos OS CLI are correct? (Choose two.)
- A. The default configuration requires you to log in as the admin user.
- B. A factory-default login assigns the hostname Amnesiac to the device.
- C. Most Juniper devices identify the root login prompt using the % character.
- D. Most Juniper devices identify the root login prompt using the > character.
Correct Answer: BC
Question #88
Which two statements about user-defined security zones are correct? (Choose two.)
- A. Users cannot share security zones between routing instances.
- B. Users can configure multiple security zones.
- C. Users can share security zones between routing instances.
- D. User-defined security zones do not apply to transit traffic.
Correct Answer: AB
Question #89
Which Web filtering solution uses a direct Internet-based service for URL categorization?
- A. Juniper ATP Cloud
- B. Websense Redirect
- C. Juniper Enhanced Web Filtering
- D. local blocklist
Correct Answer: C
Question #90
Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)
- A. Junos-host
- B. functional
- C. null
- D. management
Correct Answer: AC
Question #91
Which two statements are true about Juniper ATP Cloud? (Choose two.)
- A. Juniper ATP Cloud is an on-premises ATP appliance.
- B. Juniper ATP Cloud can be used to block and allow IPs.
- C. Juniper ATP Cloud is a cloud-based ATP subscription.
- D. Juniper ATP Cloud delivers intrusion protection services.
Correct Answer: BC
Question #92
Which two addresses are valid address book entries? (Choose two.)
- A. 173.145.5.21/255.255.255.0
- B. 153.146.0.145/255.255.0.255
- C. 203.150.108.10/24
- D. 191.168.203.0/24
Correct Answer: BD
Question #93
An application firewall processes the first packet in a session for which the application has not yet been identified.
In this scenario, which action does the application firewall take on the packet?
- A. It allows the first packet.
- B. It denies the first packet and sends an error message to the user.
- C. It denies the first packet.
- D. It holds the first packet until the application is identified.
Correct Answer: D
Question #94
Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these IoT devices from becoming zombies in a DDoS attack.
Which Juniper ATP feature should you configure to accomplish this task?
- A. IPsec
- B. static NAT
- C. allowlists
- D. C&C feeds
Correct Answer: D