Leads4pass > Juniper > Associate JNCIA-SEC > JN0-230 > JN0-230 Online Practice Questions and Answers

JN0-230 Online Practice Questions and Answers

Questions 4

You want to automatically generate the encryption and authentication keys during IPsec VPN

establishment.

What would be used to accomplish this task?

A. IPsec

B. Diffie_Hellman

C. Main mode

D. Aggregate mode

Buy Now
Questions 5

You are configuring an IPsec VPN tunnel between two location on your network. Each packet must be

encrypted and authenticated.

Which protocol would satisfy these requirements?

A. MD5

B. ESP

C. AH

D. SHA

Buy Now
Questions 6

What are the valid actions for a source NAT rule in J-Web? (choose three.)

A. On

B. Off

C. Pool

D. Source

E. interface

Buy Now
Questions 7

The Sky ATP premium or basic-Threat Feed license is needed fort which two features? (Choose two.)

A. Outbound protection

B. CandC feeds

C. Executable inspection

D. Custom feeds

Buy Now
Questions 8

Which type of NAT is performed by the SRX Series device?

A. Source NAT with PAT

B. Source Nat without PAT

C. Destination NAT without PAT

D. Destination NAT with PAT

Buy Now
Questions 9

Which two statements are true about security policy actions? (Choose two.)

A. The reject action drops the traffic and sends a message to the source device.

B. The deny action silently drop the traffic.

C. The deny action drops the traffic and sends a message to the source device.

D. The reject action silently drops the traffic.

Buy Now
Questions 10

You want to generate reports from the l-Web on an SRX Series device. Which logging mode would you use in this scenario?

A. Syslog

B. Stream

C. Event

D. local

Buy Now
Questions 11

Which two statements are true about UTM on an SRX340? (Choose two.)

A. A default UTM policy is created.

B. No default profile is created.

C. No default UTM policy is created

D. A default UTM profile is created

Buy Now
Questions 12

You configure and applied several global policies and some of the policies have overlapping match criteria.

A. In this scenario, how are these global policies applies?

B. The first matched policy is the only policy applied.

C. The most restrictive that matches is applied.

D. The least restrictive policy that matches is applied.

Buy Now
Questions 13

Which two statements are correct about functional zones? (Choose two.)

A. A functional zone uses security policies to enforce rules for transit traffic.

B. Traffic received on the management interface in the functional zone cannot transit out other interface.

C. Functional zones separate groups of users based on their function.

D. A function is used for special purpose, such as management interface

Buy Now
Exam Code: JN0-230
Exam Name: Security-Associate (JNCIA-SEC)
Last Update: Nov 11, 2024
Questions: 82
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99