Leads4pass > Juniper > JNCIP > JN0-634 > JN0-634 Online Practice Questions and Answers

JN0-634 Online Practice Questions and Answers

Questions 4

Click the Exhibit button.

Referring to the exhibit, which two statements are true? (Choose two.)

A. You can secure inter-VLAN traffic with a security policy on this device.

B. You can secure intra-VLAN traffic with a security policy on this device.

C. The device can pass Layer 2 and Layer 3 traffic at the same time.

D. The device cannot pass Layer 2 and Layer 3 traffic at the same time.

Buy Now
Questions 5

Click the Exhibit button.

You are trying to implement secure wire on your SRX Series device. However, you are receiving the commit error shown in the exhibit.

What must you do to solve the problem?

A. Add the correct logical units to the interfaces in the secure wire.

B. Put the ge-0/0/4 and ge-0/0/5 interfaces in separate secure wires.

C. Change the Ethernet switching mode from access to trunk for the ge-0/0/4 and ge-0/0/5 interfaces.

D. Add the ge-0/0/4 and ge-0/0/5 interfaces to the SV VLAN.

Buy Now
Questions 6

Click the Exhibit button.

Which statement explains the current state value of the command output shown in the exhibit?

A. A valid response was received from a domain PC probe, and the user is a valid domain user programmed in the PFE.

B. An invalid response was received from a domain PC probe, and the user is an invalid domain user.

C. A probe event generated an entry in the authentication table, but no probe response has been received from the domain PC.

D. The user-to-address mapping was successfully read from the domain controller event logs, and an entry was added to the authentication table witch currently resides on the Routing Engine.

Buy Now
Questions 7

What is the required when deploying a log collector in Junos Space?

A. root user access to the log collector

B. a shared log file directory on the log collector

C. the IP address of interface eth1 on the log collector

D. a distributed deployment of the log collector nodes

Buy Now
Questions 8

Click the Exhibit button.

The UTM policy shown in the exhibit has been applied to a security policy on a branch SRX Series device. In this scenario, which statement is true?

A. HTTP downloads of ZIP files will be blocked.

B. FTP downloads of ZIP files will be blocked.

C. E-mail downloads of ZIP files will be blocked.

D. ZIP files can be renamed with a new extension to pass through the filter.

Buy Now
Questions 9

Which two parameters are required to match in an IDP rule for the terminal option to take effect? (Choose two.)

A. attacks custom-attacks

B. attacks predefined-attacks

C. application

D. source-address

Buy Now
Questions 10

SRX Series devices with AppSecure support which three custom signatures? (Choose three.)

A. MAC address-based mapping

B. latency detection mapping

C. IP protocol-based mapping

D. ICMP-based mapping

E. Layer 7-based signatures

Buy Now
Questions 11

Click the Exhibit button.

Two hosts on the same subnet are connected to an SRX340 using interfaces ge-0/0/4 and ge-0/0/5. The two hosts can communicate with each other, but they cannot communicate with hosts outside of their subnet.

Referring to the exhibit, which three actions would you take to solve this problem? (Choose three.)

A. Add the ge-0/0/4 and ge-0/0/5 interfaces to the L2 zone.

B. Remove the irb.0 interface from the L2 zone.

C. Set the SRX340 to Ethernet switching mode.

D. Configure a security policy to permit the traffic.

E. Reboot the SRX340.

Buy Now
Questions 12

Click the Exhibit button.

Referring to the exhibit, a user with IP address 10.1.1.85 generates a request that triggers the HTTP:EXT:DOT-LNK IDP signature that is a member of the "HTTP ?All" predefined attack group.

In this scenario, which statement is true?

A. The session will be closed and a reset sent to the client and server.

B. A Differentiated Services code point value of 8 will be applied.

C. No action will be taken and the attack information will be logged.

D. The session will be dropped with no reset sent to the client or server.

Buy Now
Questions 13

Click the Exhibit button.

Referring to the exhibit, the host has been automatically blocked from communicating on the network because a malicious file was downloaded. You cleaned the infected host and changed the investigation status to Resolved ?Fixed.

What does Sky ATP do if the host then attempts to download a malicious file that would result in a threat score of 10?

A. Sky ATP does not log the connection attempt and an SRX Series device does not allow the host to communicate on the network.

B. Sky ATP logs the connection attempt and an SRX Series device does not allow the host to communicate on the network.

C. Sky ATP logs the connection attempt and an SRX Series device allows the host to communicate on the network.

D. Sky ATP does not log the connection attempt and an SRX Series device allows the host to communicate on the network.

Buy Now
Exam Code: JN0-634
Exam Name: Security, Professional (JNCIP-SEC)
Last Update: Nov 15, 2024
Questions: 65
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99