Certbus > Juniper > JNCIS-SEC > JN0-334 > JN0-334 Online Practice Questions and Answers

JN0-334 Online Practice Questions and Answers

Questions 4

Click the Exhibit button.

Referring to the configuration shown in the exhibit, which two statements are true? (Choose two.)

A. The log is being stored on the local Routing Engine.

B. The log is being sent to a remote server.

C. The syslog is configured for a user facility.

D. The syslog is configured for an info facility.

Browse 90 Q&As
Questions 5

What information does JIMS collect from domain event log sources? (Choose two.)

A. For user login events, JIMS collects the username and group membership information.

B. For device login events. JIMS collects the device IP address and operating system version.

C. For device login events, JIMS collects the device IP address and machine name information.

D. For user login events, JIMS collects the login source IP address and username information.

Browse 90 Q&As
Questions 6

Click the Exhibit button.

You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

A. B. C. D.

Browse 90 Q&As
Questions 7

You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers.

Which feature should you implement to satisfy this requirement?

A. SSL proxy

B. AppSecure

C. JIMS

D. JATP

Browse 90 Q&As
Questions 8

Which solution should you use if you want to detect known attacks using signature-based methods?

A. SSL proxy

B. JIMS

C. IPS

D. ALGs

Browse 90 Q&As
Questions 9

What are two valid JIMS event log sources? (Choose two.)

A. Microsoft Windows Server 2012 audit logs

B. Microsoft Active Directory server event logs

C. Microsoft Exchange Server event logs

D. Microsoft Active Directory audit logs

Browse 90 Q&As
Questions 10

What are two types of collectors for the JATP core engine? (Choose two.)

A. SNMP

B. e-mail

C. Web

D. telemetry

Browse 90 Q&As
Questions 11

You want to use Sky ATP to protect your network; however, company policy does not allow you to send any files to the cloud.

Which Sky ATP feature should you use in this situation?

A. Only use on-premises local Sky ATP server anti-malware file scanning.

B. Only use cloud-based Sky ATP file hash lookups.

C. Only use on-box SRX anti-malware file scanning.

D. Only use cloud-based Sky ATP file blacklists.

Browse 90 Q&As
Questions 12

Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)

A. JIMS synchronizes Active Directory authentication information between a primary and secondary JIMS server.

B. JIMS forwards Active Directory authentication information to SRX Series client devices.

C. JIMS collects and maintains a database of authentication information from Active Directory domains.

D. JIMS replicates Active Directory authentication information to non-trusted Active Directory domain controllers.

Browse 90 Q&As
Questions 13

You are deploying the Junos application firewall feature in your network.

In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)

A. destination port

B. source port

C. destination IP address

D. source IP address

Browse 90 Q&As
Questions 14

After performing a software upgrade on an SRX5800 chassis cluster, you notice that node1 is in the primary state and node0 is in the backup state. Your network standards dictate that node0 should be in the primary state.

In this scenario, which command should be used to comply with the network standards?

A. request chassis cluster failover redundancy-group 254 node 1

B. request chassis cluster failover redundancy-group 0 node 0

C. request chassis cluster failover redundancy-group 254 mode 0

D. request chassis cluster failover redundancy-group 0 node 1

Browse 90 Q&As
Questions 15

You are troubleshooting advanced policy-based routing (APBR). Which two actions should you perform in this scenario? (Choose two.)

A. Verify that the APBR profiles are applied to the egress zone.

B. Verity inet.0 for correct route leaking.

C. Review the APBR statistics for matching rules and route modifications.

D. Inspect the application system cache for the application entry.

Browse 90 Q&As
Questions 16

What is the correct step sequence used when Sky ATP analyzes a file?

A. static analysis -> cache lookup -> antivirus scanning -> dynamic analysis

B. cache lookup -> static analysis -> antivirus scanning -> dynamic analysis

C. cache lookup -> antivirus scanning -> static analysis -> dynamic analysis

D. dynamic analysis -> static analysis -> antivirus scanning -> cache lookup

Browse 90 Q&As
Questions 17

You must deploy AppSecure in your network to block risky applications.

In this scenario, which two AppSecure features are required? (Choose two.)

A. AppFW

B. AppID

C. APBR

D. AppTrack

Browse 90 Q&As
Questions 18

What are three primary functions of JATP? (Choose three.)

A. detection

B. encryption

C. optimization

D. analytics

E. mitigation

Browse 90 Q&As
Exam Code: JN0-334
Exam Name: Security-Specialist (JNCIS-SEC)
Last Update: Apr 13, 2024
Questions: 90 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99