Download Security, Professional (JNCIP-SEC).JN0-634.SelfTestEngine.2018-09-23.39q.vcex

Vendor: Juniper
Exam Code: JN0-634
Exam Name: Security, Professional (JNCIP-SEC)
Date: Sep 23, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Click the Exhibit button. 
  
Referring to the exhibit, which two statements are true? (Choose two.) 
  1. You can secure inter-VLAN traffic with a security policy on this device.
  2. You can secure intra-VLAN traffic with a security policy on this device.
  3. The device can pass Layer 2 and Layer 3 traffic at the same time.
  4. The device cannot pass Layer 2 and Layer 3 traffic at the same time.
Correct answer: AC
Question 2
Click the Exhibit button. 
  
You are trying to implement secure wire on your SRX Series device. However, you are receiving the commit error shown in the exhibit. 
What must you do to solve the problem?
  1. Add the correct logical units to the interfaces in the secure wire.
  2. Put the ge-0/0/4 and ge-0/0/5 interfaces in separate secure wires.
  3. Change the Ethernet switching mode from access to trunk for the ge-0/0/4 and ge-0/0/5 interfaces.
  4. Add the ge-0/0/4 and ge-0/0/5 interfaces to the SV VLAN.
Correct answer: A
Question 3
You want to review AppTrack statistics to determine the characteristics of the traffic being monitored. 
Which operational mode command would accomplish this task on an SRX Series device? 
  1. show services application-identification statistics applications
  2. show services application-identification application detail
  3. show security application-tracking counters
  4. show services security-intelligence statistics
Correct answer: A
Question 4
Which AppSecure feature identifies applications that are present in traffic?
  1. AppID
  2. AppTrack 
  3. AppFW
  4. AppQoS
Correct answer: A
Question 5
What is the correct application mapping sequence when a user goes to Facebook for the first time through an SRX Series device?
  1. first packet > process packet > check application system cache > classify application > process packet > match and identify application
  2. first packet > check application system cache > process packet > classify application > match and identify application
  3. first packet > check application system cache > classify application > process packet > match and identify application
  4. first packet > process packet > check application system cache > classify application > match and identify application
Correct answer: D
Question 6
You need to add all of the sites in the domain example.com to urllist2. You decide to use wildcards to account for any changes made to the domain in the future. 
In this scenario, which two commands would you use to meet this requirement? (Choose two.) 
  1. set custom-objects url-pattern urllist2 value http://*.example.com
  2. set custom-objects url-pattern urllist2 value http://*example.com
  3. set custom-objects url-pattern urllist2 value http://*.example.???
  4. set custom-objects url-pattern urllist2 value http://*.example.*
Correct answer: AC
Explanation:
Question 7
What is a function of UTM?
  1. AppFW
  2. IPsec
  3. content filtering
  4. bridge mode
Correct answer: C
Question 8
You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restarted to the VLANs from which they 
originate. Which configuration accomplishes these objectives? 
  1. bridge {
    block-non-ip-all;
    bpdu-vlan-flooding;
    }
  2. bridge {
    block-non-ip-all;
    bypass-non-ip-unicast;
    no-packet-flooding;
    }
  3. bridge {
    bypass-non-ip-unicast;
    bpdu-vlan-flooding;
    }
  4. bridge {
    block-non-ip-all;
    bypass-non-ip-unicast;
    bpdu-vlan-flooding;
    }
Correct answer: A
Question 9
You have configured a log collector VM and Security Director. System logging is enabled on a branch SRX Series device, but security logs do not appear in the monitor charts. 
How would you solve this problem?
  1. Configure a security policy to forward logs to the collector.
  2. Configure application identification on the SRX Series device.
  3. Configure security logging on the SRX Series device.
  4. Configure J-Flow on the SRX Series device.
Correct answer: C
Question 10
Click the Exhibit button.  
  
Referring to the configuration shown in the exhibit, which statement explains why traffic matching the IDP signature DNS:OVERFLOW:TOO-LONG-TCP-MSG is not being stopped by the SRX Series device?
  1. The security policy dmz-pol1 has an action of permit.
  2. The IDP policy idp-pol1 is not configured as active.
  3. The IDP rule r2 has an ip-action value of notify.
  4. The IDP rule r1 has an action of ignore-connection.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!