Juniper JNCIS-SEC JN0-334 Practice Test Questions – Security, Specialist (JNCIS-SEC)

You must be JNCIA-Junos certified and looking for a future in the Security domain. This JNCIS-SEC exam (JN0-334) will test your basic understanding of security technology and will assess your ability to secure Junos software for SRX Series devices. This is designed for beginner to intermediate level network engineers. Juniper Network will analyze your expertise in managing large networks. You have to pass the 90 minutes written exam and need to answer 65 multiple-choice questions to achieve JNCIS-SEC certification.

PassQuestion offers accurate examples of Juniper JNCIS-SEC JN0-334 Practice Test Questions so that you can successfully prepare for your JN0-334 exam. If you are looking to find away of maximising your chances of passing your JN0-334 exam.PassQuestion provides Juniper JNCIS-SEC JN0-334 Practice Test Questions for JN0-334 exam can 100% help you pass JN0-334 test.

Juniper JNCIS-SEC JN0-334 Practice Test Questions – Security, Specialist (JNCIS-SEC)

1. What are two examples of RTOs? (Choose two.)

 
 
 
 

2. Click the Exhibit button.

Referring to the exhibit, you want to deploy Sky ATP with Policy Enforcer to block infected hosts at the access layer.

To complete this task, where should you configure the default gateway for the User-1 device?

 
 
 
 

3. Click the Exhibit button.

You need to have the JATP solution analyzer .jar, .xls, and .doc files.

Referring to the exhibit, which two file types must be selected to accomplish this task? (Choose two.)

 
 
 
 

4. Which three features are parts of Juniper Networks’ AppSecure suite? (Choose three.)

 
 
 
 
 

5. Which two statements are correct about server-protection SSP proxy? (Choose two.)

 
 
 
 

6. Which statement is true about high availability (HA) chassis clusters for the SRX Series device?

 
 
 
 

7. What are two types of attack objects used by IPS on SRX Series devices? (Choose two.)

 
 
 
 

8. When considering managed sessions, which configuration parameter determines how full the session table must be to implement the early age-out function?

 
 
 
 

9. You are asked to improve resiliency for individual redundancy groups in an SRX4600 chassis cluster.

Which two features would accomplish this task? (Choose two.)

 
 
 
 

10. What are two elements of a custom IDP/IPS attack object? (Choose two.)

 
 
 
 

11. Which statement describes the AppTrack module in AppSecure?

 
 
 
 

12. Click the Exhibit button.

Referring to the exhibit, which two values in the JIMS SRX client configuration must match the values configured on the SRX client? (Choose two.)

 
 
 
 

13. Click the Exhibit button.

Referring to the exhibit, which statement is true?

 
 
 
 

14. What are two valid JIMS event log sources? (Choose two.)

 
 
 
 

15. Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)

 
 
 
 
 

16. Click the Exhibit button.

You have implemented SSL proxy client protection. After implementing this feature, your users are complaining about the warning message shown in the exhibit.

Which action must you perform to eliminate the warning message?

 
 
 
 

17. Which two statements are correct about server-protection SSP proxy? (Choose two.)

 
 
 
 

18. Which two statements describe application-layer gateways (ALGs)? (Choose two.)

 
 
 
 

19. When referencing a SSL proxy profile in a security policy, which two statements are correct? (Choose two.)

 
 
 
 

20. You want to support reth LAG interfaces on a chassis cluster.

What must be enabled on the interconnecting switch to accomplish this task?

 
 
 
 

21. Click the Exhibit button.

Referring to the exhibit, which two devices are considered to be part of the secure fabric site with Policy Enforcer? (Choose two.)

 
 
 
 

22. What is the maximum number of supported interfaces on a vSRX hosted in a VMware environment?

 
 
 
 

23. Click the Exhibit button.

You examine the log file shown in the exhibit after running the set security idp active-policy

command.

Which two statements are true in this scenario? (Choose two.)

 
 
 
 

24. What is the default timeout period for a TCP session in the session table of a Junos security device?

 
 
 
 

25. Click the Exhibit button.

The output shown in the exhibit is displayed in which format?

 
 
 
 

26. Which two functions are performed by Juniper Identity Management Service (JIMS)? (Choose two.)

 
 
 
 

27. You are deploying the Junos application firewall feature in your network.

In this scenario, which two elements are mapped to applications in the application system cache? (Choose two.)

 
 
 
 

28. You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic.

Which two parameters are required to accomplish this task? (Choose two.)

 
 
 
 

29. Click the Exhibit button.

Which two statements are true about the configuration shown in the exhibit? (Choose two.)

 
 
 
 

30. Click the Exhibit button.

You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

A)

B)

C)

D)

 
 
 
 

31. Which two statements describe SSL proxy on SRX Series devices? (Choose two.)

 
 
 
 

32. How many nodes are configurable in a chassis cluster using SRX Series devices?

 
 
 
 

33. Which statement is true about high availability (HA) chassis clusters for the SRX Series device?

 
 
 
 

34. Which default protocol and port are used for JIMS to SRX client communication?

 
 
 
 

35. You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers.

Which feature should you implement to satisfy this requirement?

 
 
 
 

36. You are configuring a client-protection SSL proxy profile.

Which statement is correct in this scenario?

 
 
 
 

37. Which two statements describe JSA? (Choose two.)

 
 
 
 

38. Which statement about the control link in a chassis cluster is correct?

 
 
 
 

39. Which solution should you use if you want to detect known attacks using signature-based methods?

 
 
 
 

40. Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)

 
 
 
 

Junos, Associate (JNCIA-Junos) JN0-103 Sample Questions
JN0-681 Free Questions - Data Center, Professional (JNCIP-DC)

Leave a Reply

Your email address will not be published. Required fields are marked *