Click the Exhibit button.
You are asked to allow only ping and SSH access to the security policies shown in the exhibit.
Which statement will accomplish this task?
You want to block executable files ("exe) from being downloaded onto your network.
Which UTM feature would you use in this scenario?
According to the Juniper Networks official JNCIA-SEC Exam Guide, web filtering is a feature used to control access to web content, including the ability to block specific types of files.
In the scenario mentioned, you want to block executable files from being downloaded, which can be accomplished by using web filtering. The feature allows administrators to configure policies that block specific file types, including "exe" files, from being downloaded.
Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)
Junos-host and null are two non-configurable zones that exist by default on an SRX Series device. Junos-host is the default zone for all internal interfaces and services, such as management and other loopback interfaces. The null zone is used to accept all traffic that is not explicitly accepted by other security policies, and is the default zone for all unclassified traffic. Both zones cannot be modified or deleted.
References: https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/security-zones-overview.html https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/security-zones-default-zone-configuration.html
Click the Exhibit button.
Which two statements are correct about the partial policies shown in the exhibit? (Choose two.)
What are two features of the Juniper ATP Cloud service? (Choose two.)
You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.
Which NAT type must be used to complete this project?
Only static NAT with pool ensures both traffic initiated from inside and outside networks use the same IP address.
Which two statements are correct about global policies? (Choose two.)
Global policies are used to define rules for traffic that is not associated with any particular zone. This type of policy is evaluated first, before any rules related to specific zones are evaluated.
For more detailed information about global policies, refer to the Juniper Networks Security Policy Overview guide, which can be found at https://www.juniper.net/documentation/en_US/junos/topics/reference/security-policy-overview.html. The guide provides an overview of the Juniper Networks security policy architecture, as well as detailed descriptions of the different types of policies and how they are evaluated.
Your ISP gives you an IP address of 203.0.113.0/27 and informs you that your default gateway is 203.0.113.1. You configure destination NAT to your internal server, but the requests sent to the webserver at 203.0.113.5 are not arriving at the server.
In this scenario, which two configuration features need to be added? (Choose two.)
You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.
What information will this command provide? (Choose two.)
When creating a site-to-site VPN using the J-Web shown in the exhibit, which statement is correct?
What is the order of the first path packet processing when a packet enters a device?
Which Web filtering solution uses a direct Internet-based service for URL categorization?
Juniper Enhanced Web Filtering is a web filtering solution that uses a direct Internet-based service for URL categorization. This service allows Enhanced Web Filtering to quickly and accurately categorize URLs and other web content, providing real-time protection against malicious content. Additionally, Enhanced Web Filtering is able to provide detailed reporting on web usage, as well as the ability to define and enforce acceptable use policies.
References: https://www.juniper.net/documentation/en_US/junos-space-security-director/topics/task/configuration/security-services-web-filtering-enhanced.html https://www.juniper.net/documentation/en_US/junos-space-security-director/topics/task/configuration/security-services-web-filtering-enhanced-overview.html