Download Security Design, Specialist (JNCDS-SEC).JN0-1330.ExamLabs.2019-02-27.65q.vcex

Vendor: Juniper
Exam Code: JN0-1330
Exam Name: Security Design, Specialist (JNCDS-SEC)
Date: Feb 27, 2019
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which security solution protects against zero-day attacks?
  1. DDoS protection
  2. advanced anti-malware
  3. content filtering
  4. Application Layer Gateways
Correct answer: B
Question 2
Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)
  1. Dynamic analysis involves unique deception techniques.
  2. Machine-learning algorithms are enabled to adapt to and identify new malware.
  3. Rapid cache lookups are used to quickly identify known files.
  4. Files are flagged for next-day analysis for certain malware types.
  5. It uses a single, best-in-class antivirus engine.
Correct answer: ABC
Explanation:
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:Rapid cache lookups to identify known files.  Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
  • Rapid cache lookups to identify known files.  
  • Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape 
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Question 3
Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location. 
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)
  1. HTTP
  2. SCP
  3. TFTP
  4. FTP
  5. CIFS
Correct answer: ABD
Explanation:
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
Question 4
You are asked to implement a new application to share documents with trusted external organizations while minimizing the risk of an attack that would enable access to other enterprise systems. 
In this scenario, which two locations would you recommend to deploy the application? (Choose two.)
  1. public cloud
  2. management VLAN
  3. enterprise LAN
  4. enterprise DMZ
Correct answer: AD
Question 5
You are designing a WAN solution for a small service provider. The service provider has asked you to include ways to mitigate potential DDoS attacks against their customers. 
Which two solutions should you include in your proposal? (Choose two.)
  1. BGP flowspec
  2. remote triggered back hole
  3. intrusion prevention system
  4. unified threat management
Correct answer: AB
Question 6
Your customer is purchasing another company. They must establish communication between the two corporate networks, which use an overlapping IPv4 address space. The customer knows they must deploy some of Network Address Translation (NAT). 
Which type of NAT should you use?
  1. destination
  2. source
  3. persistent
  4. static
Correct answer: D
Question 7
Which component of the Juniper NFV solution architecture acts as the VNF manager?
  1. MetaFabric
  2. Service Control Gateway
  3. Contrail
  4. vSRX
Correct answer: C
Explanation:
Reference: https://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000633-en.pdf
Reference: https://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000633-en.pdf
Question 8
In the ever-changing threat landscape, you are seeking to deploy a dynamic anti-malware solution. 
What are three characteristics of the Sky Advanced Threat Prevention public cloud infrastructure? (Choose three.)
  1. Machine-learning algorithms adapt to and identify new malware.
  2. It provides rapid cache lookups to identify known files.
  3. Known malicious files are quickly identified and replicated to the firewall.
  4. It processes all known file types.
  5. It uses dynamic analysis including unique deception techniques.
Correct answer: ABE
Explanation:
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:Rapid cache lookups to identify known files.  Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Sky Advanced Threat Prevention’s identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
  • Rapid cache lookups to identify known files.  
  • Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.  
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape 
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
Question 9
You need to provide wireless access to the user community without reducing security. 
Which action accomplishes this task?
  1. Provide all users with the pre-shared key to the SSID to validate their access.
  2. Record the users’ MAC addresses.
  3. Require users to authenticate with EAP-TLS.
  4. Hide the broadcast of the SSID.
Correct answer: C
Question 10
Where are the security policies enforced for next-generation firewalls?
  1. at the Presentation Layer
  2. at the Session Layer
  3. at the Data Link Layer
  4. at the Application Layer
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!