Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

JN0-636 Exam Dumps - Security Professional (JNCIP-SEC)

Question # 4

You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled

automatically from the certificate authority.

In this scenario, which statement is correct.

A.

You can use CRL to accomplish this behavior.

B.

You can use SCEP to accomplish this behavior.

C.

You can use OCSP to accomplish this behavior.

D.

You can use SPKI to accomplish this behavior.

Full Access
Question # 5

you must create a secure fabric in your company’s network

In this Scenario, Which three statements are correct? (Choose Three)

A.

MX Series device associated with tenants can belong to only one site

B.

A switch must be assigned to the site to enforce an infected host policy within the network

C.

SRX Series devices can belong to multiple sites

D.

SRX Series devices can belong to only one site

E.

Switches and connectors cannot be added to the same site

Full Access
Question # 6

Which two security intelligence feed types are supported?

A.

infected host feed

B.

Command and Control feed

C.

custom feeds

D.

malicious URL feed

Full Access
Question # 7

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Full Access
Question # 8

You issue the command shown in the exhibit.

Which policy will be active for the identified traffic?

A.

Policy p4

B.

Policy p7

C.

Policy p1

D.

Policy p12

Full Access
Question # 9

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Full Access
Question # 10

Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?

A.

The number of traffic selectors configured for the VPN.

B.

The number of CoS queues configured for the VPN.

C.

The number of classifiers configured for the VPN.

D.

The number of forwarding classes configured for the VPN.

Full Access
Question # 11

you must find an infected host and where the a􀆩ack came from using the Juniper ATP Cloud. Which two monitor workspaces will return the requested information? (Choose Two)

A.

Hosts

B.

File Scanning

C.

Threat Sources

D.

Encrypted Traffic

Full Access
Question # 12

Click the Exhibit button.

Which type of NAT is shown in the exhibit?

A.

NAT46

B.

NAT64

C.

persistent NAT

D.

DS-Lite

Full Access
Question # 13

Exhibit

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

Full Access
Question # 14

Exhibit

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Full Access
Question # 15

SRX Series device enrollment with Policy Enforcer fails To debug further, the user issues the following command show configuration services security—intelligence url

https : //cloudfeeds . argon . juniperaecurity . net/api/manifeat. xml

and receives the following output:

What is the problem in this scenario?

A.

The device is directly enrolled with Juniper ATP Cloud.

B.

The device is already enrolled with Policy Enforcer.

C.

The SRX Series device does not have a valid license.

D.

Junos Space does not have matching schema based on the

Full Access
Question # 16

Exhibit

The exhibit shows a snippet of a security flow trace.

In this scenario, which two statements are correct? (Choose two.)

A.

This packet arrived on interface ge-0/0/4.0.

B.

Destination NAT occurs.

C.

The capture is a packet from the source address 172.20.101.10 destined to 10.0.1.129.

D.

An existing session is found in the table.

Full Access
Question # 17

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

A.

Configure the tenant as TSYS1 for the pi security profile.

B.

Configure the tenant as root for the pi security profile.

C.

Configure the tenant as master for the pi security profile.

D.

Configure the tenant as local for the pi security profile

Full Access
Question # 18

You want to enable inter-tenant communica􀆟on with tenant system.

In this Scenario, Which two solutions will accomplish this task?

A.

interconnect EVPN switch

B.

interconnect VPLS switch

C.

external router

D.

logical tunnel interface

Full Access
Question # 19

Exhibit

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The 3uspicious_Endpoint3 feed is only usable by the SRX-1 device.

B.

You must manually create the suspicious_Endpoint3 feed in the Juniper ATP Cloud interface.

C.

The 3uspiciou3_Endpoint3 feed is usable by any SRX Series device that is a part of the same realm as SRX-1

D.

Juniper ATP Cloud automatically creates the 3uopi'cioua_Endpoints feed after you commit the security policy.

Full Access
Question # 20

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Full Access
Question # 21

Exhibit.

Referring to the exhibit, a spoke member of an ADVPN is not functioning correctly.

Which two commands will solve this problem? (Choose two.)

A.

[edit interfaces]

user@srx# delete st0.0 multipoint

B.

[edit security ike gateway advpn-gateway]

user@srx# delete advpn partner

C.

[edit security ike gateway advpn-gateway]

user@srx# set version v1-only

D.

[edit security ike gateway advpn-gateway]

user@srx# set advpn suggester disable

Full Access
Question # 22

You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and

only uses a single Phase 2 SA for both sites.

In this scenario, which VPN should be used?

A.

An IPsec group VPN with the corporate firewall acting as the hub device.

B.

Full mesh IPsec VPNs with tunnels between all sites.

C.

A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.

D.

A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.

Full Access
Question # 23

which two statements about the configuration shown in the exhibit are correct ?

Exhibit:

A.

The remote IKE gateway IP address is 203.0.113.100.

B.

The local peer is assigned a dynamic IP address.

C.

The local IKE gateway IP address is 203.0.113.100.

D.

The remote peer is assigned a dynamic IP address.

Full Access
Question # 24

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 25

The monitor traffic interface command is being used to capture the packets destined to and the from the SRX Series device.

In this scenario, which two statements related to the feature are true? (Choose two.)

A.

This feature does not capture transit traffic.

B.

This feature captures ICMP traffic to and from the SRX Series device.

C.

This feature is supported on high-end SRX Series devices only.

D.

This feature is supported on both branch and high-end SRX Series devices.

Full Access
Question # 26

Click the Exhibit button.

When attempting to enroll an SRX Series device to JATP, you receive the error shown in the exhibit. What is the cause of the error?

A.

The fxp0 IP address is not routable

B.

The SRX Series device certificate does not match the JATP certificate

C.

The SRX Series device does not have an IP address assigned to the interface that accesses JATP

D.

A firewall is blocking HTTPS on fxp0

Full Access
Question # 27

Exhibit

The show network-access aaa radius-servers command has been issued to solve authentication issues.

Referring to the exhibit, to which two authentication servers will the SRX Series device continue to send requests? (Choose TWO)

A.

200l:DB8:0:f101;:2

B.

192.168.30.191

C.

192.168.30.190

D.

192.168.30.188

Full Access
Question # 28

Exhibit

A.

The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.

What are two appropriate mitigation actions for the selected incident? (Choose two.)

B.

Immediate response required: Block malware IP addresses (download server or CnC server)

C.

Immediate response required: Wipe infected endpoint hosts.

D.

Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.

E.

Not an urgent action: Use IVP to confirm if machine is infected.

Full Access
Question # 29

Click the Exhibit button.

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Full Access
Question # 30

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Full Access
Question # 31

Exhibit

Referring to the exhibit, which statement is true?

A.

This custom block list feed will be used before the Juniper Seclntel

B.

This custom block list feed cannot be saved if the Juniper Seclntel block list feed is configured.

C.

This custom block list feed will be used instead of the Juniper Seclntel block list feed

D.

This custom block list feed will be used after the Juniper Seclntel block list feed.

Full Access
Question # 32

Exhibit:

Referring to the exhibit, which two statements are correct?

A.

All of the entries are a threat level 8

B.

All of the entries are command and control entries.

C.

All of the entries are Dshield entries

D.

All of the entries are a threat level 10.

Full Access
Question # 33

Exhibit

You are asked to establish an IBGP peering between the SRX Series device and the router, but the session is not being established. In the security flow trace on the SRX device, packet drops are observed as shown in the exhibit.

What is the correct action to solve the problem on the SRX device?

A.

Create a firewall filter to accept the BGP traffic

B.

Configure destination NAT for BGP traffic.

C.

Add BGP to the Allowed host-inbound-traffic for the interface

D.

Modify the security policy to allow the BGP traffic.

Full Access
Question # 34

Exhibit

You are using ATP Cloud and notice that there is a host with a high number of ETI and C&C hits sourced from the same investigation and notice that some of the events have not been automatically mitigated.

Referring to the exhibit, what is a reason for this behavior?

A.

The C&C events are false positives.

B.

The infected host score is globally set bellow a threat level of 5.

C.

The infected host score is globally set above a threat level of 5.

D.

The ETI events are false positives.

Full Access