Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-232 Exam Dumps - Security, Associate (JNCIA-SEC)

Go to page:
Question # 9

Which statement is correct about source NAT?

A.

It translates MAC addresses to private IP addresses.

B.

It translates private IP addresses to public IP addresses.

C.

It performs bidirectional IP address translation.

D.

It performs translation on ingress traffic only.

Full Access
Question # 10

You have a situation where legitimate traffic is incorrectly identified as malicious by your screen options.

In this scenario, what should you do?

A.

Enable all screen options.

B.

Discard the traffic immediately.

C.

Increase the sensitivity of the screen options.

D.

Use the alarm-without-drop configuration parameter.

Full Access
Question # 11

Click the Exhibit button.

Which type of policy is shown in the exhibit?

A.

global policy

B.

inter-zone policy

C.

intra-zone policy

D.

default policy

Full Access
Question # 12

Click the Exhibit button.

Referring to the exhibit, which statement is correct?

A.

policy3 will be shadowed because it matches the same application as policy1.

B.

None of the policies will be shadowed.

C.

policy1 will be shadowed because it matches the same application as policy3.

D.

policy2 will be shadowed because it matches the same application as policy1.

Full Access
Question # 13

Which statement is correct about capturing transit packets on an SRX Series Firewall?

A.

You can capture transit packets on the egress interface using a firewall filter.

B.

You can capture transit packets by using a firewall filter on the loopback interface.

C.

You can capture transit packets by using the tcpdump utility in the shell.

D.

You can capture transit packets using sampling and port mirroring.

Full Access
Question # 14

What is the purpose of assigning logical interfaces to separate security zones in Junos OS?

A.

to simplify the configuration of network interfaces

B.

to manage routing protocols and updates

C.

to control traffic that traverses different VLANs using security policies

D.

to enable network monitoring through SNMP

Full Access
Question # 15

What are two ways that an SRX Series device identifies content? (Choose two.)

A.

It identifies and inspects the file extension of each file.

B.

It uses AppID.

C.

It identifies file types in HTTP, FTP, and e-mail protocols.

D.

It uses ALGs.

Full Access
Question # 16

You need to capture control plane traffic on a high-end SRX Series device.

How would you accomplish this task?

A.

Configure a packet capture under the edit security datapath-debug capture hierarchy.

B.

Apply a firewall filter matching the desired traffic using the sample action.

C.

Start a shell then use the tcpdump tool.

D.

Apply a port mirroring configuration under the edit forwarding options hierarchy.

Full Access
Go to page: