Pass4itsure > Juniper > JNCDS-SEC > JN0-1332 > JN0-1332 Online Practice Questions and Answers

JN0-1332 Online Practice Questions and Answers

Questions 4

You are asked to deploy a security solution in your data center that ensures all traffic flows through the SRX Series devices.

Which firewall deployment method meets this requirement?

A. one-arm

B. two-arm

C. transparent

D. inline

Buy Now
Questions 5

You are asked to include anti-malware features into an existing network design. Traffic from the infected machines must be moved to a quarantined VLAN.

Which product will provide this segregation?

A. screens

B. Sky ATP

C. unified threat management

D. Software Defined Secure Network

Buy Now
Questions 6

Which solution centralizes the management of security devices in your data center?

A. Juniper Networks Secure Analytics

B. J-Web

C. Junos Space Security Director

D. Junos CLI

Buy Now
Questions 7

You are asked to virtualize numerous stateful firewalls in your customer's data center. The customer wants the solution to use the existing Kubernetes-orchestrated architecture.

Which Juniper Networks product would satisfy this requirement?

A. vMX

B. vSRX

C. cSRX

D. CTP Series

Buy Now
Questions 8

You must allow applications to connect to external servers. The session has embedded IP address information to enable the remote system to establish a return session.

In your design, which function should be implemented?

A. source NAT

B. application layer gateway

C. destination NAT

D. HTTP redirect

Buy Now
Questions 9

You are designing a solution to protect a service provider network against volumetric denial-of-service attacks. Your main concern is to protect the network devices. Which two solutions accomplish this task? (Choose two.)

A. next-generation firewall

B. screens

C. intrusion prevention system

D. BGP FlowSpec

Buy Now
Questions 10

You work for an ISP that wants to implement remote-triggered black hole (RTBH) filters. What are three considerations in this scenario? (Choose three.)

A. Source RTBH can block legitimate traffic on the network

B. BGP FlowSpec improves the RTBH model by implementing dynamic firewall filters

C. Source RTBH requires uRPF to be implemented on the service provider's network core

D. Destination RTBH requires uRPF to be implemented on the service provider's network edge

E. Destination RTBH essentially completes the attack on the victim's IP

Buy Now
Questions 11

You are designing a data center interconnect between two sites across a service provider Layer 2 leased line. The sites require Layer 2 connectivity between hosts, and the connection must be secure.

In this scenario, what will accomplish this task?

A. IRB VLAN routing

B. MACsec encryption

C. EVPN over IPsec

D. IPsec encryption

Buy Now
Questions 12

You are asked to design a secure enterprise WAN where all payload data is encrypted and branch sites communicate directly without routing all traffic through a central hub.

Which two technologies would accomplish this task? (Choose two.)

A. group VPN

B. AutoVPN

C. MPLS Layer 3 VPN

D. Auto Discovery VPN

Buy Now
Questions 13

You are creating a security design proposal for a customer who is connecting their headquarters to a remote branch site over an unsecured Internet connection. As part of your design, you must recommend a solution to connect these sites together and ensure that the communication is secured and encrypted.

In this scenario, which solution do you recommend?

A. GRE

B. XMPP

C. IPsec

D. MPLS

Buy Now
Exam Code: JN0-1332
Exam Name: Security Design Specialist (JNCDS-SEC)
Last Update: Apr 16, 2024
Questions: 65
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99